Welcome to Legit Writing

LegitWriting LegitWriting

The Internet relies on the domain name system (DNS) to translate a domain name to an IP address. This along with the structure and routing of IP packets rely on cooperation among independently managed network components.
Utilize the Walden University Library websites devoted to Internet security and computer emergency readiness, and other resources to locate an article describing a specific IP weakness or vulnerability. The article should be from a reliable source and no more than four years old. You might consider packet sniffing, denial of service attacks, spoofing, cache poisoning, or hijacking.
Post to this Discussion, a summary of the article in which you:
• Describe the vulnerability
• Explain how the IP and DNS structure allows that vulnerability
• Describe strategies for identifying that an attack has taken place exploiting that vulnerability
• Describe what reasonable steps might be taken to prevent this form of attack
Required Resources
• Chan, M. L., Holznagel, F., &Krantz, M. (2010). 20 things I learned about browsers and the web. Retrieved from http://www.20thingsilearned.com
o IP Address and DNS
o Evolving to a Faster Web
o Malware, Phishing, and Security Risks
o Using Web Addresses to Stay Safe
• Fiedler, K., Humeau, M., Maisuradze, S., & McNamee, J. (2012). How the Internet works. The EDRi Papers (3). Retrieved from http://www.edri.org/files/2012EDRiPapers/how_the_internet_works.pdf
o The IP Address
o The Domain Name System
o Deep Packet Inspection
• Information Sciences Institute, University of Southern California. (1981). Transmission control protocol – DARPA Internet program protocol specification [Request for comments: TCP-793]. Retrieved from the Internet Engineering Task Force (IETF®) website http://www.ietf.org/rfc/rfc793.txt
• Mockapetris, P. (1987). Domain names – concepts and facilities [Request for comments: DNS-1034]. Retrieved from the Internet Engineering Task Force (IETF®) website http://www.ietf.org/rfc/rfc1034.txt
• Mockapetris, P. (1987). Domain names – implementation and specification [Request for comments: DNS-1035]. Retrieved from the Internet Engineering Task Force (IETF®) website http://www.ietf.org/rfc/rfc1035.txt
• Postel, J. (1980). User datagram protocol [Request for comments: UDP-768]. Retrieved from the Internet Engineering Task Force (IETF®) website https://www.ietf.org/rfc/rfc768.txt


Are you interested in this answer? Please click on the order button now to have your task completed by professional writers. Your submission will be unique and customized, so that it is totally plagiarism-free.