Question

In: Computer Science

Case Project 3-2 Setting Up DNS Security Your DNS servers have been hacked, and you’ve been...

Case Project 3-2 Setting Up DNS Security Your DNS servers have been hacked, and you’ve been asked to set up DNS security measures. Your supervisor wants to know the options for preventing attackers from tampering with your DNS servers. Write a memo to your supervisor discussing DNSSEC, a DNS socket pool, and DNS cache locking and how they can help secure DNS. Answer:

Solutions

Expert Solution

Setting up Domain Name System (DNS) security measures, the options for preventing attackers from tampering with the DNS servers been hacked, discussing DNSSEC, a DNS socket pool, and DNS cache locking, and how these help secure DNS:
DNSSEC is the acronym for Domain Name System Security Extensions. It is a certain set of Internet Engineering Task Force (IETF) specifications securing certain information the DNS provides, as used on Internet Protocol (IP) networks. It is, in general, a security system to give DNS servers, the ability to verify the information been received is reliable. DNSSEC prevents DNS spoofing, which is one of the security attacks.

The mechanism, from a broad perspective, works digitally signing the DNS records at the authoritative DNS server using public-key cryptography. DNSSEC is meant for protection, securing the DNS from ongoing and significant attacks against DNS infrastructure, specifically stopping man-in-the-middle attacks and personal data theft. Also, it protects the DNS clients' name resolution queries from forged DNS data and any DNS cache poisoning. It enables a DNS zone and all records in it to be signed. It is available as an advanced and enhanced feature, function, or DNS settings. It thus, simply secures DNS traffic working along with DNS policies.

DNS socket pool is another implementation of DNS security. It reduces the possibilities of cache-tampering and DNS spoofing attacks enabling a DNS server to use source or communication port randomization whenever it issues DNS queries to remote DNS servers. Increase in the size of the socket pool lets the DNS server increase the source port randomization. Hence, rather using predictable source port, the DNS server uses a random port number it selects from the DNS socket pool, thus making cache tampering attacks hard, as an attacker has to correctly guess both, the source port of the DNS query and a random transaction ID to carry out an attack.

When the DNS service is initiated, the server chooses a source port from a pool of sockets available for issuing DNS queries. The DNS socket pool, as a best practice, will need to be enabled by default on the servers. It stops a hacker from replacing records in the resolver cache, at the same time the Time to Live (TTL) is still in force.

Cache locking is, specifically a Windows Server 2012 security feature letting to control if and when information or records in the DNS server cache is overwritten. It helps in blocking records in the cache from being changed for the length of the record’s TTL value.


Related Solutions

A small company network have multiple servers (including a web server, a log server, DNS servers,...
A small company network have multiple servers (including a web server, a log server, DNS servers, a file server for inventory information and customer orders, but no email server) , two firewalls, DMZ, and PCs. The company sales products online. a). Suppose that you are a system administrator. What types of network connections will you allow to be established with the servers in the DMZ from the Internet? b). What are the points of entry for attackers? c). How do...
2. Describe in detail i)what information should be added in which DNS servers for your own...
2. Describe in detail i)what information should be added in which DNS servers for your own start-up company (say ‘nwguru.com’) that has a webserver and email service to its employees. ii) What are companies you can contact for domain name registration and how much are the fees?
1. Select a project at your target company 2. Provide background of the case project 3....
1. Select a project at your target company 2. Provide background of the case project 3. Develop Quality Management Plan including at least 5 total metrics (qualitative and/or quantitative) 4. Develop Stakeholder Management Plan including conflict management plan.
You’ve been asked to evaluate a project. Your estimates say that the first cashflow of $120k...
You’ve been asked to evaluate a project. Your estimates say that the first cashflow of $120k will occur one year from today. You believe the cashflows will increase by 4% per year for 4 additional years. After that point, the cashflows will remain the same for 5 years. The upfront cost to take the project is $950k, and the appropriate discount rate is 6%. What is the project’s NPV? PLEASE POST THE ANSWER IN THE EQUATION FORMAT - NO NEED...
You’ve been asked to evaluate a project. Your estimates say that the first cashflow of $120k...
You’ve been asked to evaluate a project. Your estimates say that the first cashflow of $120k will occur one year from today. You believe the cashflows will increase by 4% per year for 4 additional years. After that point, the cashflows will remain the same for 5 years. The upfront cost to take the project is $950k, and the appropriate discount rate is 6%. What is the project’s NPV? Please make sure to apply the equation for a perpetuity (c/(r-g))...
A security analyst is interested in setting up an IDS to monitor the company network. The...
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation? A. Network tap B. Honeypot C. Aggregation D. Port mirror
QUESTION 2 a) Using a company of your choice, explain the implications of setting up an...
QUESTION 2 a) Using a company of your choice, explain the implications of setting up an accounting system in that particular company, further explain the considerations to be made for the purchase of the system and the benefits or otherwise of applying such a system in that company. Explain any five disadvantages of cost accounting in a business organization. b) What challenges are likely to be faced by the cost accountant in the establishment of the systems in your chosen...
You have decided to go into the goat feed business. You’ve been mixing it for your...
You have decided to go into the goat feed business. You’ve been mixing it for your own goats and now neighbors and friends want the same mix. So you need to sit down and do a little economics to figure out whether this is a profit opportunity or not. The production function for your special mix of feed is:                                     Y = X11/2 X21/4 Where Y = lbs of feed mix X1 = lbs. of oats X2 = lbs. of...
You have been asked to replace the project manager who was heading up your firm’s new...
You have been asked to replace the project manager who was heading up your firm’s new compensation and benefits system. One of the reasons the project manager is being replaced is because the project schedule had the wrong resources assigned (e.g., resources who do not fully understand compensation and benefits). You have been asked to solve this problem quickly by either replacing the resources or getting the resources up-to-speed on compensation and benefits. Present your recommendation for solving this critical...
Based on the structured way you think about project design in your company, you’ve been made...
Based on the structured way you think about project design in your company, you’ve been made the team lead of a project. If you execute it successfully, you’ll reap the rewards. You’ve convened a team representing different functional groups in your company and the team has come up with several design alternatives (named A-C), which you’ve describe to your manager. You’re working hard one day when your manager rushes into your office and say...: Your manager: “OK, I just had...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT