.

Friday, October 18, 2019

Networking Term Paper Example | Topics and Well Written Essays - 2750 words

Networking - Term Paper Example Statistics show that the Internet usage has more than doubled over the last five years. However, research indicates that a majority of Internet users tend to assume that the transfer of data on the Internet is safe, reliable and is not at risk of forgery or hacking. Yang et al. (2012) argues that most Internet processes and services depend on data relayed by the Domain Name System (DNS) through excellent functioning and accurate mapping of domain names that can be understood easily using the IP addresses. Nevertheless, the DNS, which is mainly relied on for this function, does not provide any content protection. This implies that data remains unsecured against any manipulation when being relayed or while in the servers and caches. As a result, identification and avoidance of forged data becomes impossible. It is at this point that the Domain Name System Security Extensions (DNSSEC) becomes useful. DNSSEC, according to Yang et al. (2012) is a technology developed for the purposes of p rotecting data against attacks by digital ‘signing’ so as to provide assurance of its validity to the user. It authenticates the source data by ensuring that the path between the DNS servers and the validating DNS client are secured. The technology has proved remarkably effective in protecting Internet data from forgery, something that DNS has failed to provide. This paper will start by describing the DNSSEC technology in light of what it means and how it works. This will be followed by a SWOT analysis of the technology. The paper will then evaluate the current ethical and legal issues surrounding DNSSEC technology. The essay will also explore the improvements that have occurred over the last two years to DNSSEC technology and provide a suggestion on the improvements warranted on its current usage. Finally, the paper will predict the future role of DNSSEC for both personal and commercial use. It is an acknowledged fact that the Internet has revolutionized the world. Cur rently most parts of the world have Internet connectivity including the remotest regions, thanks to the recent technological advancements, according to Osterweil et al. (2011). Normally, for one to reach another person on the Internet, he, or she must type the recipient’s address on the computer or Internet-enabled phones. The address is usually unique to the individual, making it easy for computers to find each other. The unique identifiers are normally coordinated worldwide using the ICANN. Coordination of the identifiers is very crucial because, without it, the entire world would have a single global Internet, suggests Osterweil et al. (2011). When typing an address, it must first be translated into several systems before the final connection can be established. The translation of the address is performed by the DNS, which does the work of translating addresses such as www.google.com into Internet Protocol (IP) addresses. After the completion of the translation, ICANN then ensures that the addressing system is coordinated so as to ensure peculiarity of addresses. However, recent findings showed that DNS is extremely vulnerable and allows attackers to forge this process of searching for someone or site on the Internet using their address. The attacks are mainly committed in order to take charge of the session such as directing the user to the hijacker’s own deceptive website for a password and account collection. The vulnerability of the DNS has prompted the establishment of the DNSSEC

No comments:

Post a Comment