Department of Computer Science

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Microsoft Office Project 2003 Resource Kits James Scott & Roy Riley Technical Content Development Microsoft Corporation.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Microsoft ® Official Course Module 9 Configuring Applications.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
The Microsoft Baseline Security Analyzer A practical look….
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
18 Copyright © Oracle Corporation, All rights reserved. Workshop.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Windows 2000 Certificate Authority By Saunders Roesser.
Navigating SQL Server Lesson 3. Skills Matrix Graphical User Interface (GUI) Management Tools SQL Server Management Studio SQL Server Configuration Manager.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Understand Malware LESSON Security Fundamentals.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Role Of Network IDS in Network Perimeter Defense.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
EGI-InSPIRE RI Pakiti Michal Prochazka, (Daniel Kouril)
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Virtual Private Network Access for Remote Networks
Security Issues with Domain Name Systems
So You Inherited a DNS Server…
KSK Rollover Update David Conrad, CTO ICANN 59 – ccNSO Members Meeting
CompTIA Security+ Study Guide (SY0-401)
DNS Security Advanced Network Security Peter Reiher August, 2014
Troubleshooting Tools
What are they? The Package Repository Client is a set of Tcl scripts that are capable of locating, downloading, and installing packages for both Tcl and.
Secure Software Confidentiality Integrity Data Security Authentication
Securing the Network Perimeter with ISA 2004
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
TYPES OF SERVER. TYPES OF SERVER What is a server.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
How to Check if a site's connection is secure ?
CompTIA Security+ Study Guide (SY0-401)
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
AWS DevOps Engineer - Professional dumps.html Exam Code Exam Name.
Utilize Group Policy Terminal Server Settings
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Chapter 27: System Security
.edu DNSSEC Testbed Lessons Learned
Reconnaissance Report Trillium Technologies
Computer Security Distributed System Security
Lesson 16-Windows NT Security Issues
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Information Security Awareness
Data Security in Local Networks using Distributed Firewalls
Web Hacking: Beginners
Designing IIS Security (IIS – Internet Information Service)
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Using Software Restriction Policies
Enterprise Class Security Scanner
Presentation transcript:

Department of Computer Science Domain Name System Security Extensions (DNSSEC) Department of Computer Science Project Team: Ryan Ducharme + LuYao Zhang Project Advisor: Scott Kitterman Vulnerabilities in the Domain Name System have been discovered that allow attackers to hijack sessions and deceive users into visiting their web server. Domain Name System Security Extensions (DNSSEC) is a suite of extensions that are designed to make surfing the web safer by validating you are receiving the information you asked for. Since only 8% of .EDU domains are DNSSEC-enabled, this project’s purpose is to propel the University of New Hampshire to lead the way and implement DNSSEC on the www.UNH.edu domain. Abstract DNSSEC Chain of Trust Long-Term Sign the UNH.EDU zone at the University using appropriate keys Configure all name servers to support DNSSEC Short-Term Create reporting tools on a remote server using MySQL database Run queries against an isolated test domain that is signed with DNSSEC Scripts query the domain automatically from the remote server using Bash scripts Maintain a web server to display reports and health checks of the signed zone Project Goals Snapshot of a Report on the Project Web Server .GOV DNSSEC Implementation Install and test DNSViz alert tools on the remote server These tools will alert administrators if keys are nearing expiration or if the trust chain is broken Monitor the website regularly to ensure the zone is being signed automatically Analyze DNS log files for unusual activity or potential DDoS attempts What’s Next? SCAN ME! .EDU DNSSEC Implementation A Simple DIG ANY of www.it710.net