Decoding the role of DNS in cyber security

被引:0
|
作者
Morales C. [1 ]
机构
[1] Vercara, United States
关键词
Technology transfer;
D O I
10.12968/S1353-4858(24)70015-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Domain Name System (DNS) is an often overlooked element in organisations’ cyber defence strategies. Yet it is critical to the proper functioning of the systems on which organisations rely. It creates a single point of failure, and threat actors know this. They may attack DNS directly, use it as a tool or employ it as an attack vector. The results can be disastrous, so it's important to understand the role that DNS plays in your infrastructure, and to know how to protect it. © 2024 MA Healthcare Ltd. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [41] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [42] Using DNS Patterns for Automated Cyber Threat Attribution
    Leite, Cristoffer
    den Hartog, Jerry
    dos Santos, Daniel R.
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [43] Efficient and secure DNS cyber shelter on DDoS attacks
    Hong S.
    Journal of Computer Virology and Hacking Techniques, 2015, 11 (3) : 129 - 136
  • [44] Survey on Technology of Security Enhancement for DNS
    Wang W.-T.
    Hu N.
    Liu B.
    Liu X.
    Li S.-D.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (07): : 2205 - 2220
  • [45] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [46] Deploying and Monitoring DNS Security (DNSSEC)
    Osterweil, Eric
    Massey, Dan
    Zhang, Lixia
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 429 - 438
  • [47] On the performance and analysis of DNS security extensions
    Curtmola, R
    Del Sorbo, A
    Ateniese, G
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 288 - 303
  • [48] Organization Benefit as an Outcome of Organizational Security Adoption: The Role of Cyber Security Readiness and Technology Readiness
    Berlilana
    Noparumpa, Tim
    Ruangkanjanases, Athapol
    Hariguna, Taqwa
    Sarmini
    SUSTAINABILITY, 2021, 13 (24)
  • [49] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [50] Standards for Cyber Security
    Purser, Steve
    BEST PRACTICES IN COMPUTER NETWORK DEFENSE: INCIDENT DETECTION AND RESPONSE, 2014, 35 : 97 - 106