November 1, 2016 | Leave a comment The DNS is the biggest component of the Internet. It renders its services every time one sends an email, clicks on a web page, converses online or doing virtually anything over the Internet. For many years now, the OpenDNS has secured online services, and it is one of the most secure services available. However, it has not gained the state-of-the-art security level in this era. The Kaminsky Weakness will be remembered by many because it affected the world of DNS Employment. This was as a result of weaknesses and vulnerabilities related to weak DNS protocol – the portion between ISP and Internet connection. Domain name system security should offer maximum protection to this level. As more people connect to the internet with numerous devices, the need for the safety is increasing. There are several instances of man-in-the-middle, tampering attacks, and DNS snooping traffic presenting a great security breach that should be fixed. The DNS service is one of the most vulnerable and weak services in the world of Information Technology and the Internet. Business security is very vital. For maximum security to be achieved, DNS safety is the ultimate priority. This is because DNS is the most profound target for DDoS attacks as well as amplification and reflection attacks. DNS security is often overawed by numerous attacks launched against it because many companies use several DNS servers. This renders the servers down thereby denying users access to services. So far, the best target for unethical hackers is the DNS. The many weaknesses of DNS servers allow the attackers to cause an unnecessary traffic on the servers and gain access to critical company information such as personal information and payroll. This makes DNS the main source of security issues on the Internet. There are several DNS protocol attacks, but all are based on the flaws in DNS Implementation – the way it works over the Internet. Three terms refer to attacks towards DNS protocol • DS cache poisoning • DNS ID Hacking • DNS spoofing Cache poisoning is an attack that renders the DNS faulty in caching information. This action means that information on the DNS is mapped to another IP address that was not supposed to receive the information. DNS Spoofing refers to answering a request that was specifically intended to be answered by another server. DNS ID Hacking refers to the actions of a hacker trying to misdirect client information through impersonation.