Common DNS Acronyms

The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The global DNS infrastructure is made up of computing and communication entities called Name Servers each of which contains information about a small portion of the domain name space. The domain name data provided by DNS is intended to be available to any computer located anywhere in the Internet.

These acronyms and terms are frequently used when discussing securing DNS.

A: Address

ACL: Access Control List:

AD: Authenticated Data

ARP: Address Resolution Protocol

CA: Certificate Authority

ccTLD: Country-code Top-level Domain

CD: Checking Disabled

DHCP: Dynamic Host Configuration Protocol

DNS:Domain Name System

DNSSEC: Domain Name System Security Extensions

DS: Delegation Signer

DSA: Digital Signature Algorithm

DSS: Digital Signature Standard

ECDSA: Elliptic Curve Digital Signature Algorithm

FQDN:Fully Qualified Domain Name

gTLD: Generic Top-level Domain

HINFO: Host Information

HMAC: Hash-based Message Authentication Code

ICANN: Internet Corporation for Assigned Names and Numbers

IETF: Internet Engineering Task Force

IN: Internet

IP: Internet Protocol

ISP: Internet Service Provider

IT: Information Technology

KSK: Key Signing Key

LAN: Local Area Network

LOC: Location

MAC: Message Authentication Code

MD: Message Digest

MX: Mail Exchanger

NS: Name Server

NSEC: Next Secure

NSEC3: Hashed Next Secure

NTP: Network Time Protocol

OS: Operating System

PKI: Public Key Infrastructure

PIR: Public Internet Registry:

RR: Resource Record

RPZ: Response Policy Zone

RRSIG: Resource Record Signature

SEP: Secure Entry Point

SHA: Secure Hash Algorithm

SHS: Secure Hash Standard

SOA: Start of Authority

TCP: Transmission Control Protocol

TLD: Top-level Domain

TSIG: Transaction Signature

TTL: Time to Live

TXT: Text

UDP: User Datagram Protocol

ZSK: Zone Signing Key

Start taking opportunities away from cyber adversaries.

Let’s Get Started