Preview

NT260 unit 1 assignment 1

Satisfactory Essays
Open Document
Open Document
624 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT260 unit 1 assignment 1
Unit 4 Assignment 1 SMTP Security Best Practices
List and describe three SMTP server security threats.
Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.
 Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.
Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.
2. List three suggestions to harden SMTP server security. Backup your Exchange server periodically, Audit your Exchange server, and Digitally sign and Encrypt your Email.
3. In what scenario would you require TLS encryption? TLS encryption is used for the e-mail transmission while it is going across to another mail server. The other mail server could be across the internet or across your WAN.

Unit 4 Assignment 1 SMTP Security Best Practices
List and describe three SMTP server security threats.
Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.
 Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.
 Malware - Can take many

You May Also Find These Documents Helpful

  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    The SMTP server will be Sendmail. Sendmail comes with the security feature of encrypting the connection (Jang, 2011). We will also need a virus scanning program to ensure mail coming in does not have virus attachments.…

    • 295 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Robot/intermediary process is a form of attack that is lunched on one computer but attacks another computer.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Answers

    • 617 Words
    • 3 Pages

    One other security countermeasure to use if I did not want to encrypt e-mail from my corporate account would be to use a digital signature to ensure message integrity. I know this because I use it on a daily basis.…

    • 617 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    root causes of DDoS attacks by reducing Bots infections. Tools such as AD, SCCM, and…

    • 885 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Generally, the majority of the viruses are bundled up with outsider software to make the downloading and installation of pernicious program less demanding. It is likewise appropriated through phishing sites, undesirable taps on suspicious links and ads and pop-ups, opening spam emails messages or its related attachments, visiting dubious sites and porn sites. You can likewise infect your Windows System when you share your documents over peer to peer network. Hackers utilize some strategy to earn profit on the web. Installing plug-in, toolbar, add-on and expansions without thinking about it additionally lead to installation of TrafLab…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Bot-infected computers - Bots allow for a wide range of functionality and most can be updated to assume increased functionality by downloading new code and features. Attackers can use bots to perform a variety of tasks, such as setting up denial-of-service (DoS) attacks against an organization’s website, distributing spam and phishing attacks, distributing spyware and adware, propagating malicious code, and harvesting confidential information that may be used in identity theft from compromised computers—all of which can lead to serious financial and legal consequences. Attackers favor bot-infected computers with a decentralized C&C model because they are difficult to disable and allow the attackers to hide in plain sight among the massive amounts of unrelated traffic occurring over the same…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    iss project0

    • 376 Words
    • 1 Page

    2. Other than installing virus and worm control software, what can SLS do to prepare for the next…

    • 376 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Botnets represent a huge and developing danger against digital security as they give a dispersed stage to numerous digital wrongdoings, for example, Distributed Denial of Service (DDoS) assaults against basic targets, malware scattering, phishing, and click fraud[3][4]. Botnet…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Malware and Spyware

    • 976 Words
    • 4 Pages

    Malware, short for malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.…

    • 976 Words
    • 4 Pages
    Good Essays
  • Good Essays

    CyberSecurity

    • 754 Words
    • 3 Pages

    A segment of self-replicating code planted illegally in a computer program, often to damage or shutdown a system or network.…

    • 754 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It shows the power of malwares and how they can be used as a weapon to destroy enemy’s abilities. The terms Cyber war, cyber-attacks, and cyber-defense also shows the power of this malwares and how countries rely on them to understand the enemy’s power and destroy that. There was another worm after Stuxnet, named Flame that was data mining all Iranian computers to find valuable information and send that to unknown servers in different countries. Some experts call these malwares cyber-weapons. A reports shows that the use of malware…

    • 357 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Brute force is basically a term for a method of “forcing” combinations of passwords against an account login and is usually performed by a software program to automate the process (doing it manually would be just plain stupid). Sometimes these programs use a dictionary file of common words to guess the password, or they will literally try every combination of letters, numbers, and characters possible. The problem, and why this method is completely useless, is that almost every service like yahoo, hotmail, myspace, etc does not allow repeated attempts on a particular login. Brute forceing is as old as computers are and it’s easily prevented. Even if there was not this limit - the possiblity of guessing the password with a dictionary file is extremely high, and attempting every combination of a password can sometimes take years or decades at estimates.…

    • 504 Words
    • 3 Pages
    Good Essays
  • Better Essays

    from spam and phishing to malware and denial-of-service (DoS) attacks. Much of it thrives on armies of compromised hosts, or botnets, which are scattered throughout the…

    • 8864 Words
    • 36 Pages
    Better Essays