Chapter 26
Cyber Threats and Their Defense
This chapter addresses the threats to an information infrastructure and end sytems as well as the mechanisms used for defending them.The learning goals for this chapter are as follows:
- Understand the factors that must be addressed in protecting the Domain Name System (DNS)
- Explore the various facets of cache poisoning and its effect on the DNS
- Learn the importance of Dan Kaminsky’s cache poisoning attack
- Understand why authentication and integrity are a long term solution to DNS problems
- Learn the role played by DNS Security Extensions (DNSSEC) in protecting the DNS
- Understand the role of the Border Gateway Protocol (BGP) and its impact on router security
- Address the security measures that can be used ...
Get Introduction to Computer Networks and Cybersecurity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.