Suppose that an intruder could both insert and remove DNS messages into the network. Give three scenarios showing the problems that such an intruder could cause.© BrainMass Inc. brainmass.com October 25, 2018, 7:34 am ad1c9bdddf
Intrusion into a computer system on a network is the act of gaining unauthorized access to misuse information. Intrusions can be conducted in many ways and one such way is by inserting and removing DNS messages into a network. Malicious users exploit the sections of a message that determine how it will be processed by the receiving device. Message sections contain the Header, Question, Answer, Authority, and Additional fields. Some of these fields may be empty during a DNS message transmission. These empty fields or sections are the ones an intruder would generally make use of to insert/remove DNS messages. Various multiple malicious incidents can happen; some of them explained herewith:
1. DNS Cache Poisoning
Also known as the denial of service (DoS) ...
The solution discusses scenarios how an intruder could insert and delete DNS messages into a network.
Networking Problems WK5
1. Based on the Ainsworth (2007) article, are network security best practices only based on implementing hardware and software solutions? If not, how can one of these network security best practices be customized to the needs or risks present in an organization? How are the risks to a particular organization discovered or established?
2.Based on the Friedlander et al. (2007) article, what are DNS and DNSSEC? Can DNSSEC be implemented effectively by the U.S.?
3. What are some things we need to evaluate when protecting our network?
4.What purpose does a firewall play in an organization?View Full Posting Details