Vercara
flow-image

Threats to DNS Are Threats to Your Business. What You Can Do

Published by Vercara

DNS is a foundational part of the internet, and its hierarchal structure is well known and understood. However, DNS is much more than a single point product/set of products. 

DNS touches upon a myriad of other technologies that are critical to operating your business. There are many interconnected operations within the address resolution process, and bad actors can inject themselves at various stages, making the definitions of discrete attack types unclear. It is often more useful to consider the attacker’s end goal, as opposed to looking at threats to DNS by named attack types, to clarify issues and avoid confusion. Threats to DNS are threats to your business.

Primary categories of DNS attacks include:

  1. Attacks that deliver a bad/false answer to a DNS query, such as cache poisoning, domain hijacking, man-in-the-middle, and other exploits;
  2. Attacks that prevent requestors from getting any answer to a query, including distributed denial-of-service attacks;
  3. Attacks that use DNS as a transport mechanism, including those that bypass firewalls, access control lists (ACLs), intrusion detection systems (IDS), and more.

While protecting your DNS does take some effort, the benefits that can be delivered by a well-implemented system are enormous. DNS can ensure that your users get the fastest response possible, without having to change your network or infrastructure.

This paper explains how simple steps can make your DNS a positive business tool while at the same time eliminating some very real risks.

Download Now

box-icon-download

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.

Related Categories Server, Applications, Network Security, Wi-Fi, Firewall, Server, Cloud Computing, Email, Network, Software, Firewall, Enterprise Resource Planning, Network Security, Data Loss Prevention (DLP), Malware, Digital Transformation, Internet of Things (IoT), Storage Area Network (SAN), DDoS Attacks, Server, Software, Encryption