From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Domain names system
From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Domain names system
- [Instructor] All right, let's talk about the Domain Name System, or DNS. So, DNS is all about resolving fully qualified domain names, or FQDNs, to IP addresses. When you want to go talk to some server out in the internet, let's say www.linkedin.com, you've got to be able to find out its IP address so that your computer can create a packet all the way from your machine to that server, to the www.linkedin.com machine. So how are you gonna find out what its IP address is? You need to do some kind of name resolution, need to resolve the name, the fully qualified domain name, www.linkedin.com, to an IP address. And that's what we use DNS for. DNS works in this hierarchical naming structure to resolve the hierarchical fully qualified domain name, www.linkedin.com, that's a hierarchical name, to an IP address, something-something.something-something-else. So, it does this by communicating with DNS servers. Now, DNS servers are authoritative for what we refer to as zones, which is a domain…
Contents
-
-
-
-
(Locked)
Data security2m 44s
-
(Locked)
Access control models15m 51s
-
(Locked)
Single sign-on9m 21s
-
(Locked)
Centralized access control9m 49s
-
(Locked)
Network security: Firewalls13m
-
(Locked)
Authentication protocols4m 12s
-
(Locked)
VPNs and tunneling10m 6s
-
(Locked)
Domain names system6m 20s
-
(Locked)
Cryptography overview: Part 113m 49s
-
(Locked)
Cryptography overview: Part 212m 28s
-
(Locked)
Cryptography: Hash algorithms and digital signatures6m 4s
-
(Locked)
Cryptography: Public key infrastructure and certificates10m 27s
-
(Locked)
PBX and VOIP security7m 33s
-
(Locked)
Secure protocols7m 11s
-
(Locked)
Wireless security10m 15s
-
(Locked)
Internet of Things and endpoint security2m 42s
-
(Locked)
Third-party vendor controls4m 37s
-
(Locked)
Physical and environmental security3m 6s
-
(Locked)
Security assessment and testing4m
-
(Locked)
Evidence collection and forensics3m 27s
-
(Locked)
-
-
-