DEFENSIVE NETWORK SECURING PRINCIPLES and DNS SCENARIO 1: You want to access your Maybank account. Since you are in a hurry, you have provided your login user name and password in mäybänk.com instead of the original website, maybank.com. As a consequence, there is a great possibility of your Maybank account being hacked due to Cross-Site Scripting (XSS) attacks and malicious content is delivered to the users. XSS vulnerabilities can potentially lead to large-scale attacks such as stealing users' credentials-cookies, etc. SCENARIO 2: While accessing maybank.com, Domain Name System (DNS) is required for the functioning of mapping a host name and its Internet Protocol (IP) address on the Internet. As shown in Figure 1, when the web page is accessed, there must be a DNS name lookup to determine the IP address of the Web server. DNS is considered as an application layer protocol for mapping domain names to IP addresses. DNS 208.77.188.26 www.maybank.com hetps:/200.10.26 Maybank Maybank Figure 1 (c) Based on Scenario 2, examine the operations that will typically happen when mäybänk.com is accessed by you. Illustrate it with a diagram.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
QUESTION 3
DATA & NETWORK SECURITY
DEFENSIVE NETWORK SECURING PRINCIPLES and DNS
SCENARIO 1: You want to access your Maybank account. Since you are in a hurry, you
have provided your login user name and password in mäybänk.com instead of the original
website, maybank.com. As a consequence, there is a great possibility of your Maybank
account being hacked due to Cross-Site Scripting (XSS) attacks and malicious content is
delivered to the users. XSS vulnerabilities can potentially lead to large-scale attacks such
as stealing users' credentials-cookies, etc.
SCENARIO 2: While accessing maybank.com, Domain Name System (DNS) is required
for the functioning of mapping a host name and its Internet Protocol (IP) address on the
Internet. As shown in Figure 1, when the web page is accessed, there must be a DNS name
lookup to determine the IP address of the Web server. DNS is considered as an application
layer protocol for mapping domain names to IP addresses.
DNS
208.77.188.26
www.maybank.com
https//206108.26
OMaybank
OMaybank
Figure 1
(c) Based on Scenario 2, examine the operations that will typically happen when
mäybänk.com is accessed by you. Illustrate it with a diagram.
Transcribed Image Text:QUESTION 3 DATA & NETWORK SECURITY DEFENSIVE NETWORK SECURING PRINCIPLES and DNS SCENARIO 1: You want to access your Maybank account. Since you are in a hurry, you have provided your login user name and password in mäybänk.com instead of the original website, maybank.com. As a consequence, there is a great possibility of your Maybank account being hacked due to Cross-Site Scripting (XSS) attacks and malicious content is delivered to the users. XSS vulnerabilities can potentially lead to large-scale attacks such as stealing users' credentials-cookies, etc. SCENARIO 2: While accessing maybank.com, Domain Name System (DNS) is required for the functioning of mapping a host name and its Internet Protocol (IP) address on the Internet. As shown in Figure 1, when the web page is accessed, there must be a DNS name lookup to determine the IP address of the Web server. DNS is considered as an application layer protocol for mapping domain names to IP addresses. DNS 208.77.188.26 www.maybank.com https//206108.26 OMaybank OMaybank Figure 1 (c) Based on Scenario 2, examine the operations that will typically happen when mäybänk.com is accessed by you. Illustrate it with a diagram.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY