Dns security measurements

Assignment Help Operating System
Reference no: EM1379567

Question: Having a Domain Name Server available to the public can be a tool in the hand for attackers. If anyone is able to use your Domain Name Server, they can use it to send a huge amount of traffic to their victim. As a result, the victim would not be able to handle all the traffic and it would be unavailable to others who need to access it. So, we should be configure our DNS server properly and use the best security measurements we can.

Please comment this statement.

 

Reference no: EM1379567

Questions Cloud

Requirements model for aims project : Need help in finalizing the requirements model for Airlines Information Management System (AIMS) project. The requirements model require to include use case diagrams for the entire AIM system.
Steps add to the check list : According to your personal experience, what steps would you add to the check list and determine what steps would you leave out?
Designing and coding : Prepare a database with a table called tblNames and tbl Login. The tbl Names table should have the following columns.
Implementing a data warehouse project : Assume you are implementing a data warehouse project for a consumer and require to evaluate the many tools available for extracting, transforming, and loading data into the data warehouse from several sources.
Dns security measurements : Having a Domain Name Server available to the public can be a tool in the hand for attackers. If anyone is able to use your Domain Name Server, they can use it to send a huge amount of traffic to their victim.
Multicast service model in the internet : Those applications that do not need a high level of reliability for operations can use the Minimalist Internet Multicast service model, like streaming of continues information in the forms of audio or video
Explain the concepts of nat and ipv6 : At present we have a huge problem with advertising corporations which are making profiles of people by collecting their information.
Finding server side software : Find the Internet to search server side software that is needed to be installed on the hospital's servers to support access by your local hospital doctors to patients' data using their cellular phones or PDAs.
Performing the maintenance : A hard drive must be managed to be used most efficiently. This maintenance with deleting old files, defragmenting a drive so that it does not waste space, as well as, from time to time, discovering and attempting to correct disk failures.

Reviews

Write a Review

Operating System Questions & Answers

  Important information about windows operating system

Assume you have learned a great deal of important data about the Windows operating system so far. However, we have not even scratched the surface of the capabilities of Windows XP.

  Multicast service model in the internet

Those applications that do not need a high level of reliability for operations can use the Minimalist Internet Multicast service model, like streaming of continues information in the forms of audio or video

  Differences between routers and switches

Assume you are currently working for Surebank, a medium financial institution. The company has approximately eighty people working in their main location where your office is located.

  Solving hipaa privacy issues

Suppose if we learned anything from Katrina and Joplin, paper records are susceptible to loss en masse. Can you assume having 50,000 paper records blown for miles across Joplin and trying to recreate those records later

  Explaining cpu midway through the disk-service routine

CPU with interrupt-driven I/O is busy servicing  disk request. While CPU is midway through the disk-service routine, another I/O interrupt occurs. What occurs next?

  Creating the source code and flowchart

Construct a C program that displays a title, "Hello World." Insert comments in the event to document the program internally. Attach a design flow chart.

  Discuss five computer forensics tools

Use Library and internet resources to analyze five computer forensics tools. For each tool, list the vendor and its functions.

  Security and data protection systems

Determine what fault tolerance, security, and information protection systems and procedures do you recommend be instituted on and for the corporation's network from the hypothetical condition below?

  Explain what can be done to prevent race condition

Suppose shared bank account exists between husband and wife and concurrently husband calls withdraw() function and wife calls deposit(). Explain how race condition is possible and what might be done to prevent race condition from occuring.

  Examination of evidence on original media

The "forensically sound" method is to never conduct any examination on original media. There are practical and legal reasons for not performing examination on suspect's computer,

  Implementation of the electronic medical record

Explain how the effectiveness the implementation of the electronic medical record change will be determined once implemented.

  Discussion on operating systems

In recent computer trend sources, it has been discussed that the OS are likely to become more user friendly, voice driven, stable, and even will repair themselves when required.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd