Access "Time to Implement DNSSEC"
This article is part of the July/August 2008 issue of Everything you need to know about today's information security trends
What You Need: DNSSEC DNS turns 25 this year. It's high time DNSSEC is added to the protocol. Like most of the early Internet protocols, DNS wasn't meant to carry the burden it does today. It wasn't built with an Internet-as-ecommerce platform in mind. It wasn't built to contend with cache poisoning, denial-of-service attacks, phishers, pharmers, spammers or any type of scammer. DNS turns 25 this year, and it's showing its age. Coauthor Paul Mockapetris says DNS was built as a "modest" replacement for host tables that were used to keep track of network machines. The end result was the DNS we've come to know and love: a protocol that translates domain names into IP addresses. That's what was needed back on Jan. 1, 1983 when computers on the ARPANET were required to switch to the TCP/IP protocol. What's needed today is DNSSEC, more formally known as DNS Security Extensions. These help defend against some of the aforementioned attacks against DNS servers, either enterprise servers or the root DNS servers that run the Internet and have twice successfully been ... Access >>>
Premium Content for Free.
How to be an Information Security Know-it-all
The essentials every chief information security officer must master, including PCI compliance, server and desktop security, securing the data lifecycle and how to best align security and business.
Information Security and Business Integration
INTEGRATION Security professionals can rely on the same models and frameworks used by traditional business to earn a seat at the table.
Product Review: Vantos' V-Flex
Product Review: Configuresoft's Enterprise Configuration Manager 4.9
Product Review: RSA Security's RSA enVision
McAfee Secure for Websites security service review
McAfee's new security service scans websites and network infrastructure for vulnerabilities, malware, spam, malicious links and sharing of personally identifiable information.
- How to be an Information Security Know-it-all
Secure Configuration of Windows XP Desktops
DESKTOP SECURITY 5 steps to properly configure desktop security.
Tech FocusShield Your Enterprise
VA scanning works with Web app firewalls to thwart assaults.
Product Review: Applicure Technologies' dotDefender
Windows Server 2003 hardening services ensures better security
Shutting down unneeded services, ports and accounts makes Windows Server 2003 tough to beat.
Data Lifecycle Management Model Shows Risks and Integrated Data Flow
Information flows through business processes in an orderly fashion; security must flow right along with it.
Avoiding Audit Trouble: Getting PCI Compliant
Get compliant with Payment Card Industry Data Security Standard Compliance (PCI DSS) with solutions and tips from auditors and audit survivors.
- Secure Configuration of Windows XP Desktops
Time to Implement DNSSEC
Editor's Desk: DNS turns 25 this year. It's high time DNSSEC is added to the protocol.
Interview: CISO Adrian Seccombe on Eli Lilly from FIPCO to FIPNET
In this interview, CISO Adrian Seccombe discusses how Eli Lilly went from FIPCO (fully integrated pharmaceutical company) to a FIPNET (fully integrated pharmaceutical network, the importance of collaboration and the work of the Jericho Forum.
Face-Off: Chinese Cyberattacks: Myth or Menace?
Bruce Schneier and Marcus Ranum debate the threat of Chinese hackers and whether they are state-sponsored?
Loud Cries for National Data Protection Law
Perspectives: A national data protection law would help curtail identity theft and could boost international relations.
- Time to Implement DNSSEC
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...