O'Reilly logo

Introduction to Computer Networks and Cybersecurity by J. David Irwin, Chwan-Hwa Wu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 26

Cyber Threats and Their Defense

This chapter addresses the threats to an information infrastructure and end sytems as well as the mechanisms used for defending them.The learning goals for this chapter are as follows:

  • Understand the factors that must be addressed in protecting the Domain Name System (DNS)
  • Explore the various facets of cache poisoning and its effect on the DNS
  • Learn the importance of Dan Kaminsky’s cache poisoning attack
  • Understand why authentication and integrity are a long term solution to DNS problems
  • Learn the role played by DNS Security Extensions (DNSSEC) in protecting the DNS
  • Understand the role of the Border Gateway Protocol (BGP) and its impact on router security
  • Address the security measures that can be used ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required