Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
QUESTION
This topic introduces IPsec and DNSSEC from an application perspective. Research how to implement these protocols using networking devices. Why would an organization choose to implement these protocols using external networking devices rather than from within a domain controller? Briefly provide some benefits and disadvantages.
Reply to responses
A Shauna
DNSSEC adds security to DNS responses by providing the ability for DNS servers to validate DNS responses. With DNSSEC, resource records are accompanied by digital signatures. These digital signatures are generated when DNSSEC is applied to a DNS zone using a process called zone signing. IPSec is usually used in the context of a virtual private network between two machines over a public network that is almost as secure as a connection on a private network. VPN’s most well-known use case is to allow remote employees to access secured files behind a corporate firewall as if they were working in the office. The reason of why an organization may use external networking devices is because a domain controller holds a lot of sensitive information and is best to keep anything malicious off of the domain controller. Implementing these protocols can make sure sites are legitimate and they are trusted.
Fruhlinger, J. (2021, December 30). How IPsec works, it’s components and purpose. CSO Online. Retrieved March 22, 2022, from https://www.csoonline.com/article/2117067/data-protection-ipsec.html
Step-by-step: Demonstrate DNSSEC in a test lab. Microsoft Docs. (2016, August 31). Retrieved March 22, 2022, from https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831411(v=ws.11)
B Cory
IP Security Architecture (IPsec) is a protocol that is intended to boost security for communications within and outside of a network. It functions on the IP Level of the TCP/IP Protocols, and essentially allows the packets of data that are transmitted to be encrypted to deter potential threats that are listening or for those packets that are captured. It also helps authenticate packets that the network and devices receive to ensure they are not malicious. A famous example of IPsec in action would be a Virtual Private Network (VPN) (Roles of IPsec, n.d.) Domain Name System Security Extensions (DNSSEC) is another protocol that was designed with the intention of boosting security for networks and their devices. It was originally based on the Domain Name System (DNS), and was developed as DNS became less reliable. DNSSEC strengthens the DNS protocols by enforcing Data Origin Authentication, which is essentially when the sender of the data is verified as true, and Data Integrity Protection, which checks that the data received has not been changed or altered in any way since it left the sender. This helps the network to verify if the data it receives is both accurate and trustworthy, which greatly assists in protecting the network overall (Liu, 2013).
For implementation purposes, these protocols are generally implemented on the network devices themselves, rather than on the domain controller. The reason for this is for fault tolerance purposes. If these protocols are only enabled on the Domain Controller and if the Domain Controller Device ever went offline, the rest of the network would then be left vulnerable without these protocols enabled. On the opposite side, while it would be advantageous to only host these protocols on the Domain Controller to have better control and overall view of how the network is processing data, the advantages do not outweigh the risks (Implementing IPSec Network Security, 2011).
Sample Solutions
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Phasellus hendrerit. Pellentesque aliquet nibh nec urna. In nisi neque, aliquet vel, dapibus id, mattis vel, nisi. Sed pretium, ligula sollicitudin laoreet viverra, tortor libero sodales leo, eget blandit nunc tortor eu nibh. Nullam mollis. Ut justo. Suspendisse potenti.
Get sample solution
Order Now
Sed egestas, ante et vulputate volutpat, eros pede semper est, vitae luctus metus libero eu augue. Morbi purus libero, faucibus adipiscing, commodo quis, gravida id, est. Sed lectus. Praesent elementum hendrerit tortor. Sed semper lorem at felis. Vestibulum volutpat, lacus a ultrices sagittis, mi neque euismod dui, eu pulvinar nunc sapien ornare nisl. Phasellus pede arcu, dapibus eu, fermentum et, dapibus sed, urna.
Morbi interdum mollis sapien. Sed ac risus. Phasellus lacinia, magna a ullamcorper laoreet, lectus arcu pulvinar risus, vitae facilisis libero dolor a purus. Sed vel lacus. Mauris nibh felis, adipiscing varius, adipiscing in, lacinia vel, tellus. Suspendisse ac urna. Etiam pellentesque mauris ut lectus. Nunc tellus ante, mattis eget, gravida vitae, ultricies ac, leo. Integer leo pede, ornare a, lacinia eu, vulputate vel, nisl.
Suspendisse mauris. Fusce accumsan mollis eros. Pellentesque a diam sit amet mi ullamcorper vehicula. Integer adipiscing risus a sem. Nullam quis massa sit amet nibh viverra malesuada. Nunc sem lacus, accumsan quis, faucibus non, congue vel, arcu. Ut scelerisque hendrerit tellus. Integer sagittis. Vivamus a mauris eget arcu gravida tristique. Nunc iaculis mi in ante. Vivamus imperdiet nibh feugiat est.
Ut convallis, sem sit amet interdum consectetuer, odio augue aliquam leo, nec dapibus tortor nibh sed augue. Integer eu magna sit amet metus fermentum posuere. Morbi sit amet nulla sed dolor elementum imperdiet. Quisque fermentum. Cum sociis natoque penatibus et magnis xdis parturient montes, nascetur ridiculus mus. Pellentesque adipiscing eros ut libero. Ut condimentum mi vel tellus. Suspendisse laoreet. Fusce ut est sed dolor gravida convallis. Morbi vitae ante. Vivamus ultrices luctus nunc. Suspendisse et dolor. Etiam dignissim. Proin malesuada adipiscing lacus. Donec metus. Curabitur gravida
