List and describe three SMTP server security threats.
Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.
Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.
Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.
2. List three suggestions to harden SMTP server security. Backup your Exchange server periodically, Audit your Exchange server, and Digitally sign and Encrypt your Email.
3. In what scenario would you require TLS encryption? TLS encryption is used for the e-mail transmission while it is going across to another mail server. The other mail server could be across the internet or across your WAN.
Unit 4 Assignment 1 SMTP Security Best Practices
List and describe three SMTP server security threats.
Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.
Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.
Malware - Can take many