ABCs of DNS, DHCP, and IPAM security

Explore threats that can impair your organization's DNS, DHCP, and IP address management (DDI) and learn how to implement effective defense techniques.

Thank you for your interest!

If you don't find the e-book in your inbox within the next few minutes, please check your spam folder.

  • Please enter your name
  • Please enter a business email id
  • IN
  •  
    By clicking 'Get my free copy', you agree to processing of personal data according to the Privacy Policy.
 

Did you know that the average cost of a DNS attack in 2020 was $924,000*? And did you know that a DHCP attack can have big consequences on the reputation of your business?

DNS and DHCP are critical for undisturbed routing of internet-facing and internal traffic. Since all devices must interact with the DDI infrastructure to contact the internet, it becomes a potential logical chokepoint, making it many attackers' favorite target.

In this e-book, you'll find out ways to decrease the risk to your DDI infrastructure.

*IDC's 2020 Global DNS threat report.

In addition, you'll learn about:

  • What DDI is and why it's important.
  • What DNS is and how it works.
  • What DHCP is and how it works.
  • The importance of IP address management (IPAM) for your organization.
  • Threats related to DDI including DNS tunneling, distributed denial-of-service (DDoS), DHCP spoofing, and more.
  • 11 best practices to improve your DDI security posture.

What's inside?

  • Chapter 1
  • Chapter 2
  • Chapter 3
  • Chapter 4
  • Chapter 5

What is DDI?

Topics covered:

  • Domain Name System (DNS)
  • Dynamic Host Configuration Protocol (DHCP)
  • IP Address Management (IPAM)

Domain Name System (DNS) - The Resolver

Topics covered:

2.1 What is the DNS?

2.2 How does the DNS work?

2.3 Threats to the DNS

2.3.1 DDoS

2.3.2 DNS cache poisoning

2.3.3 DNS tunneling

Dynamic Host Configuration Protocol (DHCP) - The Assigner

Topics covered:

3.1 What is DHCP?

3.2 How does DHCP work?

3.3 Threats to DHCP

3.3.1 DHCP starvation

3.3.2 DHCP spoofing

IP Address Management (IPAM) - The Administrator

Topics covered:

4.1 What is IPAM?

4.2 Is IPAM essential?

Defending DDI

Topics covered:

5.1 Measures to protect an organization's DNS, DHCP, and IPAM infrastructures

5.2 How can Log360 help?

Enhance
your DDI defense

Thank you for your interest!

If you don't find the e-book in your inbox within the next few minutes, please check your spam folder.

Download the
free e-book now

  • Please enter business email only.
    Please enter business email address
  • By clicking ‘Submit’, you agree to processing of personal data according to the Privacy Policy.