๐ Exploring DNS and Network Protocols: A Deep Dive into Internet Fundamentals ๐

I've been looking at the key concepts of DNS and networking, delving into the critical components that keep our internet experiences smooth. Here's a brief overview of my findings:
๐ DNS Overview
- DNS structures domain names in a hierarchical format, culminating in top-level domains (TLDs) such as .com, .org, etc.
- The DNS process includes:
Local DNS Cache
Recursive Resolvers
Root DNS Servers
TLD Servers
Authoritative DNS Servers
- Noteworthy public DNS services include:
Google (8.8.8.8)
Cloudflare (1.1.1.1)
๐ก DNS Security Concerns
1. DNS Spoofing: Alters DNS records, redirecting users to harmful sites.
2. DDoS Attacks: Floods a target with excessive traffic, causing service interruptions.
3. DNS Hijacking: Manipulates DNS settings to direct traffic maliciously.
๐ TCP (Transmission Control Protocol)
- TCP provides reliable, connection-oriented communication within Layer 4 of the OSI model.
- Important characteristics include:
Handshake process: SYN, ACK, FIN
Retransmission of packets to recover lost data.
๐ UDP (User Datagram Protocol)
- A faster, connectionless protocol best suited for situations where speed is crucial, like video streaming and online gaming.
๐จ Key Network Threats
- SYN Flood: Exploits the TCP handshake, overwhelming servers.
- Ping of Death: Sends oversized packets that can crash systems.
Understanding these principles highlights the necessity for strong cybersecurity practices and the complex mechanics at play behind our online interactions. ๐ฅ๐ก
How are you engaging with networking or cybersecurity topics? I'd love to hear your thoughts! ๐
Subscribe to my newsletter
Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

alice eneyo
alice eneyo
Compliance Analyst with 2+ years of hands-on experience driving risk assessments, regulatory compliance, and governance initiatives across GRC frameworks including ISO 27001, NIST SP 800-53, SOC 2, and GDPR. Adept at developing and enforcing security policies, conducting internal audits, maintaining risk registers, managing third-party compliance, and supporting ISO 27001 certification readiness. Strong understanding of cybersecurity best practices and risk mitigation strategies. Known for strengthening operational resilience through proactive governance and cross-functional collaboration. Actively seeking opportunities in Compliance, GRC (Governance, Risk & Compliance), or Cybersecurity Analyst roles.