000 05648cam a2200685Ii 4500
001 ocn993432785
003 OCoLC
005 20220711203430.0
006 m o d
007 cr cnu|||unuuu
008 170711s2017 njua ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dIDEBK
_dEBLCP
_dYDX
_dUIU
_dNRC
_dOCLCQ
_dUAB
_dUIU
_dCOO
_dUPM
_dOCLCA
_dOCLCQ
019 _a993640558
_a993651104
020 _a9781119328292
_q(electronic bk.)
020 _a1119328292
_q(electronic bk.)
020 _a9781119331407
020 _a1119331404
020 _a9781119331391
020 _a1119331390
020 _z9781119328278
020 _z1119328276
029 1 _aAU@
_b000060549877
029 1 _aCHBIS
_b011150693
029 1 _aCHNEW
_b000964907
029 1 _aCHVBK
_b495227722
029 1 _aCHVBK
_b508817900
029 1 _aDEBSZ
_b494212829
029 1 _aGBVCP
_b1014966728
035 _a(OCoLC)993432785
_z(OCoLC)993640558
_z(OCoLC)993651104
050 4 _aQA76.9.A25
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aDooley, Michael
_c(Computer scientist),
_eauthor.
_97613
245 1 0 _aDNS security management /
_cMichael Dooley, Timothy Rooney.
264 1 _aHoboken, New Jersey :
_bJohn Wiley and Sons, Inc. ;
_aPiscataway, NJ :
_bIEEE Press,
_c[2017]
300 _a1 online resource :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aIEEE Press series on networks and services management
504 _aIncludes bibliographical references and index.
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed July 13, 2017).
505 0 _aDNS Security Management; Contents; Preface; Acknowledgments; 1 Introduction; Why Attack DNS?; Network Disruption; DNS as a Backdoor; DNS Basic Operation; Basic DNS Data Sources and Flows; DNS Trust Model; DNS Administrator Scope; Security Context and Overview; Cybersecurity Framework Overview; Framework Implementation; Whats Next; 2 Introduction to the Domain Name System (DNS); DNS Overview -- Domains and Resolution; Domain Hierarchy; Name Resolution; Zones and Domains; Dissemination of Zone Information; Additional Zones; Resolver Configuration; Summary; 3 DNS Protocol and Messages.
505 8 _aDNS Message FormatEncoding of Domain Names; Name Compression; Internationalized Domain Names; DNS Message Format; DNS Update Messages; The DNS Resolution Process Revisited; DNS Resolution Privacy Extension; Summary; 4 DNS Vulnerabilities; Introduction; DNS Data Security; DNS Information Trust Model; DNS Information Sources; DNS Risks; DNS Infrastructure Risks and Attacks; DNS Service Availability; Hardware/OS Attacks; DNS Service Denial; Pseudorandom Subdomain Attacks; Cache Poisoning Style Attacks; Authoritative Poisoning; Resolver Redirection Attacks; Broader Attacks that Leverage DNS.
505 8 _aNetwork ReconnaissanceDNS Rebinding Attack; Reflector Style Attacks; Data Exfiltration; Advanced Persistent Threats; Summary; 5 DNS Trust Sectors; Introduction; Cybersecurity Framework Items; Identify; Protect; Detect; DNS Trust Sectors; External DNS Trust Sector; Basic Server Configuration; DNS Hosting of External Zones; External DNS Diversity; Extranet DNS Trust Sector; Recursive DNS Trust Sector; Tiered Caching Servers; Basic Server Configuration; Internal Authoritative DNS Servers; Basic Server Configuration; Additional DNS Deployment Variants; Internal Delegation DNS Master/Slave Servers.
505 8 _aMulti-Tiered Authoritative ConfigurationsHybrid Authoritative/Caching DNS Servers; Stealth Slave DNS Servers; Internal Root Servers; Deploying DNS Servers with Anycast Addresses; Other Deployment Considerations; High Availability; Multiple Vendors; Sizing and Scalability; Load Balancers; Lab Deployment; Putting It All Together; 6 Security Foundation; Introduction; Hardware/Asset Related Framework Items; Identify: Asset Management; Identify: Business Environment; Identify: Risk Assessment; Protect: Access Control; Protect: Data Security; Protect: Information Protection; Protect: Maintenance.
505 8 _aDetect: Anomalies and EventsDetect: Security Continuous Monitoring; Respond: Analysis; Respond: Mitigation; Recover: Recovery Planning; Recover: Improvements; DNS Server Hardware Controls; DNS Server Hardening; Additional DNS Server Controls; Summary; 7 Service Denial Attacks; Introduction; Denial of Service Attacks; Pseudorandom Subdomain Attacks; Reflector Style Attacks; Detecting Service Denial Attacks; Denial of Service Protection; DoS/DDoS Mitigation; Bogus Queries Mitigation; PRSD Attack Mitigation; Reflector Mitigation; Summary; 8 Cache Poisoning Defenses; Introduction; Attack Forms.
520 8 _aThis work is an advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies.
650 0 _aInternet domain names
_xSecurity measures.
_97614
650 0 _aComputer security.
_93970
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
_97615
655 4 _aElectronic books.
_93294
700 1 _aRooney, Tim,
_eauthor.
_97616
776 0 8 _iPrint version:
_aDooley, Michael (Computer scientist).
_tDNS security management.
_dHoboken, New Jersey : John Wiley and Sons, Inc. ; Piscataway, NJ : IEEE Press, [2017]
_z9781119328278
_z1119328276
_w(OCoLC)974672804
830 0 _aIEEE Press series on networks and services management.
_97415
856 4 0 _uhttps://doi.org/10.1002/9781119328292
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c68916
_d68916