CIS 505 Strayer University Domain Name System Security Extensions Essay

User Generated

qnqqlyvggyrghegyr

Computer Science

cis 505

Strayer University

CIS

Description

Networking

Overview

Select one of the following topics in which you will base your responses in the form of a term paper:

  • Network Neutrality.
  • Web2.0.
  • Wireless Technology.
  • Broadband Convergence.
  • U.S. Telecommunication Policy.
  • Internet Security.
  • IPv6.
  • WWAN.
  • WLAN.
  • DNSSEC.
  • WAN.

Instructions

Write a fully developed paper in which you:

  1. Compose an executive summary highlighting the paper’s contents and reasoning for your chosen topic.
  2. Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities, and threats from competitors of the chosen topic.
  3. Evaluate the current ethical and legal concerns surrounding your topic.
  4. Select one ethical or legal concern surrounding your topic, take a position on the issue, and provide rationale.
  5. Analyze the improvements over the last two years to your communication technology topic, and suggest an improvement based on its current usage.
  6. Predict the future role of the communication technology you’ve selected for both personal and commercial use.
  7. Create a diagram that illustrates the communication structure of your chosen technology in Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.
  8. Use at least eight quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Synthesize research on a networking topic including ethical and legal concerns, recent improvements, and the future role of the communication technology.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hello, the work is ready. I have ensured that the work is quality and all aspects of the question are fully covered. In case of any further clarifications or edits I will be here to help. Thanks for patience and stay blessed.

Running Head: PAPER

1

Paper
Student’s Name
University Affiliation
Date

PAPER

2
Executive summary

Domain Name System Security Extensions, DNSSC, is a tool used to strengthen the
security of the Internet by preventing DNS protocol attacks (Adat & Gupta, 2018). DNSSEC
offers data integrity, authenticated denial of existence, and origin authentication of DNS data. I
chose this topic because I understand the necessities of security at all levels and that there is a
need to research more on the specifics of security at the domain name level. My interest in this
topic was also based on the global compliance levels of this security feature, with higher levels
of compliance witnessed in the United States. This security feature seems easy to implement and
offers crucial protection to clients and consumers using DNS for internet surfing and ecommerce.
DNSSEC was introduced after major DNS flaws were discovered in 1990. Immediate
actions were taken to secure DNS interactions. DNSSEC was, however, employed in the US.gov
registry in 2011 through the company Verisign (Borgolte et al., 2018). The root zone files must
be signed for hem to be verified by DNSSEC. The root zone files are managed by ICANN,
National Telecommunications and Information Administration, VeriSign, and an international
group of root server operators. From this list, it is clear that the United States leads in DNS
service implementations, and implementing DNSSEC will lead to a greater fold on the Internet.
Later in this paper, I will discuss how this is a threat to other countries.
Basically, DNSSEC creates a signature for each DNS record and stores it. The signing of
these records is a very complex process. This paper analyzes the strengths and weaknesses of
implementing DNSSEC. It further discusses the DNSSEC application opportunities and the
threats its implementation could pose to the organization. Further, the paper will evaluate the

PAPER

3

current and legal concerns surrounding DNSSEC. I will also analyze the improvements over the
past two years and finalize by giving a prediction of the future role of DNSSEC in the personal
and business sectors.
Conduct a SWOT analysis by analyzing the strengths, weaknesses, application
opportunities, and threats from competitors of the chosen topic.
Strengths
The major benefit of employing DNSSEC is that it will enhance the security of ecommerce transactions on the Internet. DNSSEC will increase the security of online banking and
minimize the risks of phishing attacks. It minimizes the risks of cybercrimes, especially cache
poisoning and man-in-the-middle attacks. A man-in-the-middle attack is whereby the client
requests information from the server, and an attacker intercepts the response being sent back to
the c...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags