Kindle Price: | $14.99 |
Sold by: | Amazon.com Services LLC |
Your Memberships & Subscriptions
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
OK
The Hidden Potential of DNS In Security: Combating Malware, Data Exfiltration, and more - The Guide for Security Professionals Kindle Edition
DNS is a foundational element of network communications. It’s also the starting point for countless cyberattacks. Threat actors abuse DNS to install malware, exfiltrate data, and perpetrate malware threats. Cyber threats that leverage DNS are widespread, sophisticated, and rapidly evolving. DNS is used by over 90 percent of malware and in an ever-growing range of pernicious attacks.
However, despite its vulnerabilities, DNS can unlock a hidden world of security capabilities that can help protect today’s highly distributed and cloud-integrated networks. The Hidden Potential of DNS in Security reveals how attackers exploit DNS and how cybersecurity professionals can proactively use DNS to turn the tables and mitigate those threats.
Knowing how to leverage the protective capabilities of DNS can give you an unprecedented head start in stopping today’s advanced cyberthreats. This book gives you that knowledge.
Written specifically for security practitioners, and including real-world case studies, this book offers a thorough yet easy-to-digest understanding of today’s most urgent and potentially damaging DNS-based cyberthreats, how to mitigate them, and how to leverage your DNS infrastructure to further your security mission. In it, you will discover:
- Why DNS is inherently vulnerable and why knowledge of DNS is now crucial for security teams
- How malware uses DNS to avoid detection and communicate with command-and-control (C2) infrastructure
- How threat actors leverage DNS in executing a broad array of attacks involving look-alike domains, domain generation algorithms, DNS tunneling, data exfiltration, and cache poisoning
- What DNSSEC is (and is not) and how it works
- How recently emerging encrypted DNS standards can impact security controls, along with the security advantages they can provide
- How DNS can be leveraged in Zero Trust architectures
- How you can improve your security posture using the DNS infrastructure you already have
- LanguageEnglish
- Publication dateAugust 2, 2023
- File size8707 KB
Customers who bought this item also bought
Product details
- ASIN : B0CDNYJJ9P
- Publication date : August 2, 2023
- Language : English
- File size : 8707 KB
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Sticky notes : On Kindle Scribe
- Print length : 237 pages
- Best Sellers Rank: #508,265 in Kindle Store (See Top 100 in Kindle Store)
- #9 in Unix DNS & Bind
- #35 in Internet & Networking
- #57 in Internet & Networking Computer Hardware
- Customer Reviews:
About the authors
Ross Gibson, J.D. is currently a Principal Solutions Architect / Global SME for Infoblox, Inc., where he focuses on DNS security, DNS architecture, global server load balancing (GSLB), DHCP architecture, and IP address management. He holds a B.S. in Commerce from the University of Virginia, and a Juris Doctorate from the University of Richmond School of Law. He brings more than 20 years of experience in the networking industry along with his legal training and experience to his current role. Ross and his wife, Jenn, and their sons Pierce and Evan live in Richmond, Virginia with their Labrador, Aspen. When he and Jenn aren’t busy cheering on their boys at baseball games and concerts, he enjoys playing and recording music as well as cooking barbecue and pizza.
Joshua M. Kuo (郭孟謙) dreamed of becoming a novelist growing up in Taiwan but ended up studying computer science in Hawaii. He has been working in the technology field since the late 1990s, wearing many different hats in areas of programming, system administration, network architecture, information security, technical training, and consulting. Josh is passionate about sharing what he knows with others around him, sometimes a little too much. When not preaching about DNS and technology as the Senior Educator at Infoblox, Josh enjoys spending time with his young children, cooking in his kitchen and backyard, and reading about obscure topics in history (such as the history of circus, cod, and the measurement system). Josh currently lives in North Carolina with his family.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviews with images
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
A major highlight is using DNS to block command and control of botnets and malware. The book shines in demonstrating real-world implementations like detecting tunnels or sandboxing unverified links. Helpful diagrams visualize complex architectures simply.
It tackles modern issues like DDoS, phishing, and cloud security with DNS-centric solutions. The book is masterful in highlighting overlooked DNS features that can amplify defenses.
While packed with technical detail, it aptly summarizes need-to-know takeaways for time-strapped professionals. Readers will come away with a holistic methodology to incorporate DNS into their broader security strategy. For any IT leader looking to future-proof defenses, this book is a seminal guide.
With threats evolving, every cybersecurity team needs to exploit DNS as an advanced safeguard. This is the definitive handbook on the topic with actionable guidance. I highly recommend security engineers, CISOs and professionals add this invaluable book to their shelf.
This book clearly describes those methods of abuse, with numerous real-world examples of those who have fallen victim to them, and ways to avoid being added to that list. For those of us who have not really looked at DNS since college (that's probably you, admit it!), this is a fantastic refresher. However, it also covers many areas of DNS security that you probably never knew, even if you are a cybersecurity professional.
It is NOT a 'DNS 101' or a 'how to' book. It is, however, written clearly enough for anyone to benefit from, even total beginners.
This book is fantastic! It should be read and re-read by anyone involved in cybersecurity.
You can either read the book from the beginning to the end or find the topics you are most interested in. If you read from the beginning to the end the authors of the book are holding your hand along the way as you discover the new topics, but if you want to start at a specific topic, you can find it quickly in the back of the book where you will find the section ‘This Book at a Glance’.
The chapters cover a wight variety of topics and even though I have been working with DDI solutions for over 10 years there is still new things to learn about here and there. One of the great things if you buy this book is that you now have a reference work that you can go back and look at to be sure way you are making the claims that you are. There is links to reports from well reputed organizations and examples on why you still need to think about things like DNSSEC and Domian Hijacking.
I got new perspectives on stub resolver security, DNS cookies and zero trust architecture. Topics I can explore even more.
It is a book you can use as a base foundation to have an elaborate talk about an enterprises DNS security infrastructure.
Reviewed in the United States on October 11, 2023
You can either read the book from the beginning to the end or find the topics you are most interested in. If you read from the beginning to the end the authors of the book are holding your hand along the way as you discover the new topics, but if you want to start at a specific topic, you can find it quickly in the back of the book where you will find the section ‘This Book at a Glance’.
The chapters cover a wight variety of topics and even though I have been working with DDI solutions for over 10 years there is still new things to learn about here and there. One of the great things if you buy this book is that you now have a reference work that you can go back and look at to be sure way you are making the claims that you are. There is links to reports from well reputed organizations and examples on why you still need to think about things like DNSSEC and Domian Hijacking.
I got new perspectives on stub resolver security, DNS cookies and zero trust architecture. Topics I can explore even more.
It is a book you can use as a base foundation to have an elaborate talk about an enterprises DNS security infrastructure.
Top reviews from other countries
This Book is Great for DNS Security. If anyone want to protect their Environment and need visibility on traffic then this book is for them. Learned so many new things on DNS Security and DNS Communication by reading this book.
I will highly recommend this book to those who are responsible for Network and Cyber Security. As DNS is often neglected but after reading this book you will know how important DNS is.
Great work By Authors on Writing this book.
threats that most of us would have encountered. Highly recommend this for anyone who deals with DNS domain registration, dns management teams, security teams…etc.
I wish infoblox publishes many more books in future and improve the awareness of DNS management and I appreciate the efforts of the authors in compiling this book.
By Josh M. Kuo and Ross Gibson, J.D.
Before I get into my review, it’s worth noting a few things, I have had the pleasure of being trained by Josh, and subsequently have had many discussions on DDI (DNS DHCP IPAM) and DNS security. He is an interesting person to work with and he is always willing to explore different points of view and approaches, I also got to read some of the drafts for this book and played guinea pig for some of his courses, so I am probably a little biased but I have done my best to be subjective!
Vendor Agnostic:
One of the things I like about Infoblox is their investment into the DDI community overall, for example they have released several training courses aimed at giving people a “vendor agnostic” background to DDI theory and practice, and they are regularly giving people free access to these courses so if your just starting out in the field, or a technical manager who wants to gain a solid grounding in DDNS, DHCP, IPAM and DDI security it’s a great way to start.
I don’t know many organisations that provide this kind of Vendor Agnostic information, I guess it comes from the confidence in their own products.
I can say from the outset that the book follows the same principles of being a vendor agnostic look at the potential of DNS in security and not an “Infoblox sales vehicle” if that’s a concern.
Approach:
Imparting knowledge, at least worthwhile knowledge can be difficult and it is a challenge to impart complex technical knowledge in an easy to understand format. I think the approach to the book shows significant work has been put in to allow the reader to absorb the contents and understand both context and possible application in their own environment.
For the reader, you will find an introduction to the various topics, that then allows you to move to the case studies/examples with the pre-requisite knowledge.
Don’t expect an in-depth DDI primer or how to, that’s not the purpose of the book, but it does do what it says on the tin and open the reader up to the potential of DNS in security.
Contents:
Contrary to common misconceptions in the IT industry, DDI is not a simple thing, it has evolved and it is both complex but if standards are followed, resilient and stable, it has to be no modern network or indeed the internet would function without it.
In terms of security the book will surprise many in that it makes it clear that out of the box DNS is insecure.
The topics move through various relevant subjects such as DNS and Malware, Lookalike Domains, DNS tunnelling, DNSSEC. The best part for me however? There is a chapter dedicated to Encrypted DNS, something I have been spending a lot of time on, and the book does a great job of providing an introduction to it, something I would personally have bought the book just to read, and would recommend anyone with DDI responsibility or in their Job Description to get a handle on now..
Some other topics of note are DNS attacks against Clients, DNS and Zero Trust Architecture (possibly my second favourite chapter).
The final chapter “Conclusion” lists eight ways to fight DNS Insecurity, again if you have any DNS/DDI/Security responsibilities in you Job Description, and you read the book, you should be thinking, “what am I doing about this”, or at the very least putting those questions onto your roadmap.
Overall:
Overall it’s a great book and I recommend it, so whether your starting out, have inherited some DDI/DNS responsibility or you are security professional, technical manager I would recommend this, there isn’t another title out there afaik that brings these topics together cohesively so it’s a great way to start.
It's now sat on my shelf with some of the other, “formative” DDI books I have had the pleasure of reading.