Figure - uploaded by Subhajit Panda
Content may be subject to copyright.
Internet Speed Measurement Table (Before and After the Configuration of DNS 1.1.1.1 IPv4 Addresses)

Internet Speed Measurement Table (Before and After the Configuration of DNS 1.1.1.1 IPv4 Addresses)

Source publication
Article
Full-text available
As a densely populated country with a large user base, the library and information centres (LICs) in India always suffer from a lack of internet speed. Indian LICs frequently employ open DNS resolvers to achieve high internet speeds. In the new normal, the cyberattacks on Indian educational institutions have skyrocketed, necessitating the developme...

Context in source publication

Context 1
... (Measurement Lab, 2022;nPerf, 2022). The internet speed were manually collected in a Microsoft Excel sheet (see Table 1) before and after the configuration and further analysed to evaluate the increase/decrease percentage. According to the study findings, the maximum download speed was identified as 18.90 Mbps among the six PCs before the setup to 1.1.1.1 ...

Similar publications

Article
Full-text available
The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer misuse attacks, however, which has given rise to the Certificate Transparency (CT) project. The goal...

Citations

... In order to avoid unintentional information disclosure, companies must reduce the use of plaintext communication and utilize protocols for communication encryption. This can be accomplished by using private and secured networks such as VPNs and by implementing and enforcing security policies, (e.g., utilizing encrypted DNS queries (DoT-DNS over TLS and DoH-DNS over HTTPS), which are two standards developed for encrypting plaintext DNS traffic [76]) or setting browsers with rigorous settings to allow only encrypted traffic (permitting HTTPS as opposed to HTTP) or plaintext communication is blocked using firewalls. ...
Article
Full-text available
During the COVID-19 pandemic, most organizations were forced to implement a work-from-home policy, and in many cases, employees have not been expected to return to the office on a full-time basis. This sudden shift in the work culture was accompanied by an increase in the number of information security-related threats which organizations were unprepared for. The ability to effectively address these threats relies on a comprehensive threat analysis and risk assessment and the creation of relevant asset and threat taxonomies for the new work-from-home culture. In response to this need, we built the required taxonomies and performed a thorough analysis of the threats associated with this new work culture. In this paper, we present our taxonomies and the results of our analysis. We also examine the impact of each threat, indicate when it is expected to occur, describe the various prevention methods available commercially or proposed in academic research, and present specific use cases.