๐Ÿš€ Exploring DNS and Network Protocols: A Deep Dive into Internet Fundamentals ๐ŸŒ

alice eneyoalice eneyo
2 min read

I've been looking at the key concepts of DNS and networking, delving into the critical components that keep our internet experiences smooth. Here's a brief overview of my findings:

๐Ÿ“Œ DNS Overview

- DNS structures domain names in a hierarchical format, culminating in top-level domains (TLDs) such as .com, .org, etc.

- The DNS process includes:

  1. Local DNS Cache

  2. Recursive Resolvers

  3. Root DNS Servers

  4. TLD Servers

  5. Authoritative DNS Servers

- Noteworthy public DNS services include:

  • Google (8.8.8.8)

  • Cloudflare (1.1.1.1)

๐Ÿ›ก DNS Security Concerns

1. DNS Spoofing: Alters DNS records, redirecting users to harmful sites.

2. DDoS Attacks: Floods a target with excessive traffic, causing service interruptions.

3. DNS Hijacking: Manipulates DNS settings to direct traffic maliciously.

๐Ÿ” TCP (Transmission Control Protocol)

- TCP provides reliable, connection-oriented communication within Layer 4 of the OSI model.

- Important characteristics include:

  • Handshake process: SYN, ACK, FIN

  • Retransmission of packets to recover lost data.

๐ŸŒ UDP (User Datagram Protocol)

- A faster, connectionless protocol best suited for situations where speed is crucial, like video streaming and online gaming.

๐Ÿšจ Key Network Threats

- SYN Flood: Exploits the TCP handshake, overwhelming servers.

- Ping of Death: Sends oversized packets that can crash systems.

Understanding these principles highlights the necessity for strong cybersecurity practices and the complex mechanics at play behind our online interactions. ๐Ÿ–ฅ๐Ÿ’ก

How are you engaging with networking or cybersecurity topics? I'd love to hear your thoughts! ๐Ÿ”—

0
Subscribe to my newsletter

Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

alice eneyo
alice eneyo

Iโ€™m an experienced Governance, Risk, and Compliance (GRC) Analyst skilled in aligning regulatory requirements with Cybersecurity. My expertise includes Risk Management, IT Governance, Data Privacy, and Incident Management, with a focus on safeguarding companies and enhancing operational efficiency. Key skills: Effective communication and stakeholder engagement Strong time management and adaptability Detail-oriented with excellent analytical abilities Experience highlights: Risk Assessment, Business Continuity, Disaster Recovery, Incident Response Planning Policy and procedure creation for regulatory compliance Training on Security Best Practices Familiar with frameworks like PCI DSS, NIST CSF, GDPR, and NDPR. Iโ€™m passionate about staying current with industry trends and eager to contribute to dynamic organizations. For collaboration opportunities, contact me at aliceeneyo@gmail.com.