Cybersecurity, also known as computer security or IT security, is the field of protecting computer systems from the theft of information, damage of hardware, software, or data, the disruption of services through denial-of-service attacks, or the misdirection of services through botnets. The field of cybersecurity is rapidly growing in importance as the world increasingly relies on the Internet and wireless networks, computer systems, smart devices, and the many devices that make up the Internet of Things.
There are a variety of vulnerabilities, exposures, and attacks that companies should be aware of, including backdoors that allow bypassing of security, denial of service attacks, direct-access attacks, eavesdropping, phishing, privilege escalation, social engineering, tampering, spoofing through use of emails, IP addresses, Media Access Control addresses, and biometric samples, and the new type of multivector, polyrhythmic cyber threats, classified as fifth-generation cyber-attacks.
All types of computer systems are at risk, including financial regulators and institutions, telecommunications, the power grid, nuclear power plants, energy companies, utilities, industrial equipment, the aviation industry, consumer devices such as personal computers and mobile devices, increasingly computerized automobiles, government and military systems, medical devices and hospital systems, the energy sector, and the Internet of Things.
Cyber threats are continually growing, and public and private organizations are under attack every day. Cybercrime is costing the world hundreds of billions of dollars.
This whitepaper explains how one of the vulnerabilities in an organization’s security stack is the recursive infrastructure known as the domain name system or DNS. It explains emphasizes the importance of companies closing this back-door to prevent the devastating consequences of an attack. Proactive protection against malware at the DNS control-point is very important. This whitepaper examines some of the industry standards that must be followed in order to protect your business’ IT infrastructure from threats.