How would you prevent dns cache poisoning


Assignment

• When a company-1 employee sends an email to the company-2 employee, which protocols are used in A, B, and C? Hint: The same protocol is used for A and B. (A: From the email sender to the company-1 email server, B: Between company-1 and company-2 email servers, C: From company-2 email server to the email receiver).

• What type of DNS record specifies the mail server responsible for accepting email messages?

• Understand firewall rules like

From (Host)

From (Port)

To (Host)

To (Port)

Rule

FW interface

Any

Any

Any

25

Allow

Internal

• How would you prevent DNS cache poisoning?

• Assume that you are designing a network protocol to enable secure communications over an untrusted network.

• Write two malicious actions that might debilitate the confidentiality, integrity, or availability of the communication between the sender and the receiver.

• Security features that the company may expect from a cloud provider.

• As a security administrator, prescribe a set of network and computer-based controls of applications.

• Convert metrics into Key Performance Indicators (KPIs) to help top-level managers make informed decisions.

• Incident response lifecycle is composed of four stages. These are (i) Recovery and resumption, (ii) Review and improvement, (iii) Incident detection, and (iv) Response and containment.

• Put these in the correct lifecycle stage (Just examples there are more on the test) (i) Contact ISP, (ii) Contact vendors, (iii) Create more restrictive firewall rules, (iv) Disconnect the affected system from the network, (v) IDS - Intrusion Detection System,

• Physical security measure, explain the benefits of using smart devices (IoT devices).

Format your assignment according to the give formatting requirements:

• The answer must be using Times New Roman font (size 12), double spaced, typed, with one-inch margins on all sides.

• The response also includes a cover page containing the student's name, the title of the assignment, the course title, and the date. The cover page is not included in the required page length.

• Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: How would you prevent dns cache poisoning
Reference No:- TGS03143598

Now Priced at $55 (50% Discount)

Recommended (96%)

Rated (4.8/5)