Friday, May 3, 2019

Networking Term Paper Example | Topics and Well Written Essays - 2750 words

Networking - Term Paper ExampleStatistics show that the earnings usage has more than doubled oer the last five years. However, research indicates that a majority of network users tend to assume that the transfer of info on the Internet is safe, reliable and is not at risk of forgery or hacking. Yang et al. (2012) argues that most Internet processes and services depend on data relayed by the Domain Name System (DNS) through beautiful functioning and accurate mapping of domain names that can be understood easily using the IP addresses. Nevertheless, the DNS, which is mainly relied on for this function, does not show any content protection. This implies that data remains unbolted against any manipulation when being relayed or while in the servers and caches. As a result, identification and dodging of forged data becomes impossible. It is at this point that the Domain Name System Security Extensions (DNSSEC) becomes useful. DNSSEC, according to Yang et al. (2012) is a applied sc ience developed for the purposes of protecting data against attacks by digital signing so as to provide assurance of its validity to the user. It authenticates the source data by ensuring that the path between the DNS servers and the validating DNS client atomic number 18 secured. The technology has proved remarkably effective in protecting Internet data from forgery, something that DNS has failed to provide. This paper give start by describing the DNSSEC technology in light of what it means and how it works. This will be followed by a SWOT analysis of the technology. The paper will then evaluate the current ethical and legal issues contact DNSSEC technology. The essay will also explore the improvements that have occurred over the last two years to DNSSEC technology and provide a suggestion on the improvements warranted on its current usage. Finally, the paper will predict the coming(prenominal) role of DNSSEC for both personal and commercial use. It is an acknowledged fact tha t the Internet has revolutionized the world. Currently most separate of the world have Internet connectivity including the remotest regions, thanks to the new-fangled technological advancements, according to Osterweil et al. (2011). Normally, for one to reach another(prenominal) person on the Internet, he, or she must type the recipients address on the estimator or Internet-enabled phones. The address is usually unique to the individual, making it easy for computers to find each other. The unique identifiers are normally coordinated worldwide using the ICANN. Coordination of the identifiers is very crucial because, without it, the entire world would have a single global Internet, suggests Osterweil et al. (2011). When typing an address, it must first be translated into several systems before the final affiliation can be established. The translation of the address is performed by the DNS, which does the work of translating addresses such(prenominal) as www.google.com into Internet communications protocol (IP) addresses. After the completion of the translation, ICANN then ensures that the addressing system is coordinated so as to ensure peculiarity of addresses. However, recent findings showed that DNS is extremely vulnerable and allows attackers to forge this process of searching for someone or site on the Internet using their address. The attacks are mainly committed in order to take charge of the session such as directing the user to the hijackers own deceptive website for a password and cipher collection. The vulnerability of the DNS has prompted the establishment of the DNSSEC

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.