Information Security and Assurance

DNS

          Domain Name Server can be referred to as the address book of the internet. The purpose of Domain name server is to allow all of the computers in the world to communicate with each other.

“At its most basic, DNS is a directory of names that match with numbers. The numbers, in this case are IP addresses, which computers use to communicate with each other” (Shaw 2018).

            Each ip address has a domain name attached to it, because humans have a much easier time remembering words and letters, rather than a list numbers. When you search google.com, your computer reads it as 74.125.224.72 (Mitchell 2018). Sites like google or amazon can have hundreds of ip addresses attached to its domain name (Shaw 2018).

For example, the server your computer reaches for www.google.com is likely completely different from the server that someone in another country would reach by typing the same site name into their browser” (Shaw 2018).

            Considering the amount of ip addresses available in the world, one DNS directory would not be able to house them all. Domain name servers are scattered across the countries of the  world and communicate with each other frequently to provide updated information (Shaw 2018).

#Information #Security #Assurance

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Exercise 7B Postlab Instructions: Below is a list of the

  Exercise 7B Postlab Instructions: Below is a list of the resources that you need to complete the Postlab Assignment for Exercise 7B. The correctness and effort of your work determines your grade on this set of activities.  This assignment should be completed individually.  Any assignments that have been duplicated

Your written assignment for this module should be a 1-2

Your written assignment for this module should be a 1-2 page (not including title page and reference page) that describes the following: What did you learn from this course that you did not already know? How will you apply what you learned to your patient care? You should include a

Discuss the issue of racist symbols in the United States.

  Discuss the issue of racist symbols in the United States. In recent years there has been an increased use of Confederate flags, swastikas, and conflict over the removal of confederate statues (the Charlottesville riot was caused by the planned removal of a statue of Robert E. Lee). Analyze how

What role do nurses have in selecting and evaluating information

  What role do nurses have in selecting and evaluating information systems within your work environment? What strategies facilitated implementation of the information system and/or what were the barriers to implementation? Submission Instructions: Your initial post should be at least 600 words, formatted and cited in current APA style with support

complete the following worksheet after reading and watching the story

complete the following worksheet after reading and watching the story Hills like White Elephants (pages 197-200)   Directions:  This story’s message is never directly mentioned. Hemmingway conveys his point through the setting description and symbolism. For the following, describe what you think could be the symbolic meaning:    Licorice                                                                                          Alcohol

Using theories to assess ethical issues

Write a five page paper assessing one of the issues discussed in the textbooks and in class from the perspective of each of the three approaches to ethics identified by Michael Sandel. Identify the strengths and weaknesses of each approach, consider them carefully, and make a case for which has

select one of the topics below to research and write

select one of the topics below to research and write on. The topic choice is up to the learner, but the top selection must come from this list. The United States Criminal Justice System  Criminal Law in the United States The History of US Law Enforcement  Compare different police patrol

Complete Case Project 10-3 from page 466 Case Project 10-3:

 Complete Case Project 10-3 from page 466  Case Project 10-3: Rooting and Jailbreaking Research rooting and jailbreaking. What are the advantages? What are the disadvantages? How frequently is this technology used? Can a device that has been broken return to its default state? If so, how? Finally create a list

Write about gender discrimination in the workplac

Now I need Phrase 2, is Annotated Bibliography, I will upload Phrase one and instructions. Phase 2 (5-7 pages, 150 points)—- Annotated Bibliography A minimum of 12 sources is required for a “C” paper (75%). No more than 1/3 of the references may be internet-based. I need 20 sources for

Hacking

Description Starting in the spring of 2014, eBay was subjected to a series of security intrusions into its database of user passwords. The breach occurred when hackers compromised some employee login credentials, giving them access to the eBay system. It took over two months for eBay to know it had

Discuss the biggest challenges to effective communication in your workplace.

  Discuss the biggest challenges to effective communication in your workplace. Consider in your response: 1. What are the biggest barriers to effective communication at your organization?  2. How do cultural dynamics impact communication among staff and providers? With patients? 3. Your evidence-based recommendations to address communication barriers in your organization.

LU Narcotics Anonymous Discussion Nursing Assignment Help

discuss a very brief description (one paragraph for the group session– do NOT include the actual 12-steps) to include the following: Official name of the program or group you observed. When and where did you go to the group? Why did you choose this specific meeting? Brief history of program