๐Ÿš€ Exploring DNS and Network Protocols: A Deep Dive into Internet Fundamentals ๐ŸŒ

alice eneyoalice eneyo
2 min read

I've been looking at the key concepts of DNS and networking, delving into the critical components that keep our internet experiences smooth. Here's a brief overview of my findings:

๐Ÿ“Œ DNS Overview

- DNS structures domain names in a hierarchical format, culminating in top-level domains (TLDs) such as .com, .org, etc.

- The DNS process includes:

  1. Local DNS Cache

  2. Recursive Resolvers

  3. Root DNS Servers

  4. TLD Servers

  5. Authoritative DNS Servers

- Noteworthy public DNS services include:

  • Google (8.8.8.8)

  • Cloudflare (1.1.1.1)

๐Ÿ›ก DNS Security Concerns

1. DNS Spoofing: Alters DNS records, redirecting users to harmful sites.

2. DDoS Attacks: Floods a target with excessive traffic, causing service interruptions.

3. DNS Hijacking: Manipulates DNS settings to direct traffic maliciously.

๐Ÿ” TCP (Transmission Control Protocol)

- TCP provides reliable, connection-oriented communication within Layer 4 of the OSI model.

- Important characteristics include:

  • Handshake process: SYN, ACK, FIN

  • Retransmission of packets to recover lost data.

๐ŸŒ UDP (User Datagram Protocol)

- A faster, connectionless protocol best suited for situations where speed is crucial, like video streaming and online gaming.

๐Ÿšจ Key Network Threats

- SYN Flood: Exploits the TCP handshake, overwhelming servers.

- Ping of Death: Sends oversized packets that can crash systems.

Understanding these principles highlights the necessity for strong cybersecurity practices and the complex mechanics at play behind our online interactions. ๐Ÿ–ฅ๐Ÿ’ก

How are you engaging with networking or cybersecurity topics? I'd love to hear your thoughts! ๐Ÿ”—

0
Subscribe to my newsletter

Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

alice eneyo
alice eneyo

Compliance Analyst with 2+ years of hands-on experience driving risk assessments, regulatory compliance, and governance initiatives across GRC frameworks including ISO 27001, NIST SP 800-53, SOC 2, and GDPR. Adept at developing and enforcing security policies, conducting internal audits, maintaining risk registers, managing third-party compliance, and supporting ISO 27001 certification readiness. Strong understanding of cybersecurity best practices and risk mitigation strategies. Known for strengthening operational resilience through proactive governance and cross-functional collaboration. Actively seeking opportunities in Compliance, GRC (Governance, Risk & Compliance), or Cybersecurity Analyst roles.