Understanding the Internet Connectivity and Vulnerabilities- Routers, ISPs, DNS, and Security Exploits Internet Connections around the World

Understanding the Internet Connectivity and Vulnerabilities- Routers, ISPs, DNS, and Security Exploits Internet Connections around the World

 

The internet is an interconnection of many small networks. This interconnection forms an extensive interconnection that requires several network devices configured for different purposes (Greenstein, 2020). One of the network devices used in the interconnection is a router. Routers are layer three devices used to forward packets from one network to another (Greenstein, 2020). Therefore, a router would be required for two or more networks to communicate. A router is placed at the gateway of each internal network. For security purposes, routers are configured with access control lists to ensure that only authorized packets can flow in and out of a network (Greenstein, 2020).

The Domain Name Service (DNS) converts IP addresses into domain names and vice versa (Greenstein, 2020). Accordingly, this enables users to type names on web browsers and transfer them to the intended resources. For example, a user would type google.com, and the DNS would convert that into an IP address locating the Google resources. Therefore, users do not have to know or memorize IP addresses for sites they would like to visit.

Internet Service Providers (ISPs) are organizations that provide clients with internet connection services (Greenstein, 2020). Internet users can manage their internal network or LAN, but when they are required to connect with an external network, they need third-party management. The internet is an external network; therefore, internet users require ISPs to provide internet services. This would be in the form of a wired or wireless connection (Greenstein, 2020). Therefore, ISPs, routers, and DNS are a significant part of connecting networks over the internet.

Internet’s Structure Weak Points

The internet’s structure contains various devices used for different purposes (Rabbi et al., 2019). Hackers constantly check for weak points in the internet infrastructure to exploit. The main vulnerable points are heterogeneity and authentication (Rabbi et al., 2019). By having diverse devices on a network that require communication, interoperability becomes a basic need. For two different devices to communicate, a mechanism of data exchange is implemented (Rabbi et al., 2019). A common set of protocols must be used for the different devices to communicate. Accordingly, these protocols become a target for hackers (Rabbi et al., 2019). Manufacturers of the different devices make the devices with high-security measures; therefore, hackers find it challenging to target different devices. But because the communication protocols are common, hence, used on all devices, they become the target. Authentication for network devices is vital in keeping the network safe (Rabbi et al., 2019). However, users tend to weaken authentication by using simple passwords, sharing passwords, or leaving their sessions running. Using simple passwords such as people and pet names makes it easy for hackers to crack passwords. Leaving network sessions running unattended would allow a hacker to access the account unmonitored and masquerade as a legal user.

Exploiting the Internet’s Weak Points

Hackers and other cyber attackers start by identifying a network’s weak points (Rabbi et al., 2019). For example, if an attacker identifies a weak password combination, they would perform a brute force attack. Consequently, this would enable them to try different password combinations until they get the correct password. An attacker can access network resources such as files storing sensitive data with a valid password. The data could be used to ask for ransom from the attacked company or be used to sabotage the company by sharing business secrets. When users are accessing the internet, malicious links could be sent to them by attackers. If the links are opened, attackers could acquire users’ information such as passwords and usernames. The attackers would then pose as genuine users and defraud other unsuspecting internet users (Rabbi et al., 2019). When devices on a network are not adequately secured, attackers can run a JavaScript code on the user’s device. For example, a web server could be compromised by cross-site scripting (Rabbi et al., 2019). As a result, this would enable attackers to send malicious links to other users enticing them to click. Their internet connection to the website would then be compromised, leading to the collection of their personal information.

Zone Transfers on DNS

Domain Name Service servers store domain names and are used to translate domain names to IP addresses (Dimitrov & Panayotova, 2020). Exchange protocols rely on DNS to facilitate communication on digital platforms. The protocols include file transfer protocol, hypertext transfer protocol, and simple mail transfer protocol (Dimitrov & Panayotova, 2020). The DNS system is dis

Order a similar paper

Get the results you need