{"id":5599,"date":"2018-09-26T00:42:46","date_gmt":"2018-09-26T04:42:46","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5599"},"modified":"2018-09-26T00:44:11","modified_gmt":"2018-09-26T04:44:11","slug":"icann-sets-plan-to-reinforce-internet-dns-security","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/09\/26\/icann-sets-plan-to-reinforce-internet-dns-security\/","title":{"rendered":"ICANN sets plan to reinforce internet DNS security"},"content":{"rendered":"<p>The Internet Corporation for Assigned Names and Numbers (ICANN) has decided to change the cryptographic key that helps protects the Domain Name Systems (DNS). The process of changing the cryptographic key is called the root key the root key rollover or KSK rollover. The DNS root key is a cryptographic public-private key pair used for DNSSec signing of the DNS root zone records. The KSK rollover means that generating a new pair of cryptographic public-private key and distributing to organizations who operate validating resolvers. The primary driving for the root KSK rollover is the growth in attack capability of cybercriminals.<\/p>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/3305070\/internet\/icann-sets-plan-to-reinforce-internet-dns-security.html\">https:\/\/www.networkworld.com\/article\/3305070\/internet\/icann-sets-plan-to-reinforce-internet-dns-security.html<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet Corporation for Assigned Names and Numbers (ICANN) has decided to change the cryptographic key that helps protects the Domain Name Systems (DNS). The process of changing the cryptographic key is called the root key the root key rollover or KSK rollover. The DNS root key is a cryptographic public-private key pair used for [&hellip;]<\/p>\n","protected":false},"author":17266,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715345],"tags":[],"class_list":{"0":"post-5599","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-04-enterprise-architecture","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/17266"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5599"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5599\/revisions"}],"predecessor-version":[{"id":5602,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5599\/revisions\/5602"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}