Decoding the role of DNS in cyber security

被引:0
|
作者
Morales C. [1 ]
机构
[1] Vercara, United States
关键词
Technology transfer;
D O I
10.12968/S1353-4858(24)70015-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Domain Name System (DNS) is an often overlooked element in organisations’ cyber defence strategies. Yet it is critical to the proper functioning of the systems on which organisations rely. It creates a single point of failure, and threat actors know this. They may attack DNS directly, use it as a tool or employ it as an attack vector. The results can be disastrous, so it's important to understand the role that DNS plays in your infrastructure, and to know how to protect it. © 2024 MA Healthcare Ltd. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [31] The role of insurers in shaping international cyber-security norms about cyber-war
    Wolff, Josephine
    CONTEMPORARY SECURITY POLICY, 2024, 45 (01) : 141 - 170
  • [32] Crew Role in CNS-ATM Cyber Security: Cyber Readiness of Air Traffic Controllers
    Sampigethaya, Krishna
    Wilkerson, Kyle
    2024 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE, ICNS, 2024,
  • [33] Cyber Security without Cyber War
    O'Connell, Mary Ellen
    JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209
  • [34] Cyber victimology-decoding cyber-crime victimisation
    Cole, Tessa
    CRIME PREVENTION & COMMUNITY SAFETY, 2023, 25 (03) : 338 - 340
  • [35] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [36] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [37] Investigating cyber attacks using domain and DNS data
    Anderson C.
    Conwell J.‘.
    Saleh T.
    Network Security, 2021, 2021 (03) : 6 - 8
  • [38] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    INTERNET POLICY REVIEW, 2018, 7 (02):
  • [39] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [40] On the Impact of DNS over HTTPS Paradigm on Cyber Systems
    Bumanglag, Kimo
    Kettani, Houssain
    2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 494 - 499