๐ Exploring DNS and Network Protocols: A Deep Dive into Internet Fundamentals ๐
I've been looking at the key concepts of DNS and networking, delving into the critical components that keep our internet experiences smooth. Here's a brief overview of my findings:
๐ DNS Overview
- DNS structures domain names in a hierarchical format, culminating in top-level domains (TLDs) such as .com, .org, etc.
- The DNS process includes:
Local DNS Cache
Recursive Resolvers
Root DNS Servers
TLD Servers
Authoritative DNS Servers
- Noteworthy public DNS services include:
Google (8.8.8.8)
Cloudflare (1.1.1.1)
๐ก DNS Security Concerns
1. DNS Spoofing: Alters DNS records, redirecting users to harmful sites.
2. DDoS Attacks: Floods a target with excessive traffic, causing service interruptions.
3. DNS Hijacking: Manipulates DNS settings to direct traffic maliciously.
๐ TCP (Transmission Control Protocol)
- TCP provides reliable, connection-oriented communication within Layer 4 of the OSI model.
- Important characteristics include:
Handshake process: SYN, ACK, FIN
Retransmission of packets to recover lost data.
๐ UDP (User Datagram Protocol)
- A faster, connectionless protocol best suited for situations where speed is crucial, like video streaming and online gaming.
๐จ Key Network Threats
- SYN Flood: Exploits the TCP handshake, overwhelming servers.
- Ping of Death: Sends oversized packets that can crash systems.
Understanding these principles highlights the necessity for strong cybersecurity practices and the complex mechanics at play behind our online interactions. ๐ฅ๐ก
How are you engaging with networking or cybersecurity topics? I'd love to hear your thoughts! ๐
Subscribe to my newsletter
Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
alice eneyo
alice eneyo
Iโm an experienced Governance, Risk, and Compliance (GRC) Analyst skilled in aligning regulatory requirements with Cybersecurity. My expertise includes Risk Management, IT Governance, Data Privacy, and Incident Management, with a focus on safeguarding companies and enhancing operational efficiency. Key skills: Effective communication and stakeholder engagement Strong time management and adaptability Detail-oriented with excellent analytical abilities Experience highlights: Risk Assessment, Business Continuity, Disaster Recovery, Incident Response Planning Policy and procedure creation for regulatory compliance Training on Security Best Practices Familiar with frameworks like PCI DSS, NIST CSF, GDPR, and NDPR. Iโm passionate about staying current with industry trends and eager to contribute to dynamic organizations. For collaboration opportunities, contact me at aliceeneyo@gmail.com.