Infrastructure of DNS/DNSSEC
Journal Title: LAHORE GARRISON UNIVERSITY RESEARCH JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - Year 2017, Vol 1, Issue 3
Abstract
DNS Security Extension is introduced as a solution after the in-depth study of all expected issues regarding security of Domain Name System. Accordingly, DNS is domain name service provider via name server but it fails to facilitate the support for authenticity of data origin and integrity. In addition, DNS satirizing give stage to digital assaults, and can be used to watch client's exercises, for control, for conveyance of pernicious programming and to offend client's PC and even to subvert rightness and accessibility of internet systems and administrations. Therefore, it is fundamental to attract DNS framework to defeat security concerns, and to make cautious arrangement that should adapt to assaults through off way foes. So, we have broken down security of area enlistment centers and name server completely and we deal with vulnerabilities, which should open DNS foundation to store harming. In this paper, we gave the DNSSEC structure and showed how it is secure using DNSSEC.
Authors and Affiliations
ZAKA ULLAH
AN OVERVIEW ON CYBER ATTACKS AND ITS TYPES FOR ENHANCING DATA SECURITY IN BUSINESS WORLD
For sensitive data of organizations there is a compelling need of ensuring privacy in several aspects and to inculcate protective measures in systems especially in various high- tech firms. Cyber-attacks are a wide form...
Analyzing and Resolving Issues in Software Project Risk Management
In last decade the main reason for projects failure is poor management of software. But now a day’s most of the organizations are focusing on software project management for making project successful. Software project ma...
Performance Analysis of Hardware Protection & System Security in Different Operating Systems
The intention of article is to protect the hardware, which includes protecting CPU, I/O, and memory. This article portrays and relates the security in different operating systems. Therefore, helping us to choose the best...
ARTIFICIAL INTELLIGENCE AND CYC
Since 1984, it is enormous work going on for the accomplishing of the project Cyc (‗Saik‘). This work is based on knowledge of ―Artificial Intelligence‖ which is developed by the Cycorpcompany and by Douglas Lenat at MCC...
Face and Face Parts Detection in Image Processing
This paper based on a procedure for automatically detecting one or more human faces, eyes pair, nose, mouth in colour images. This is depending on two-method which first detects regions of face, eyes pair, nose, mouth co...