Preview

Unit 4 Assignment 1: Smtp Security Best Practices

Satisfactory Essays
Open Document
Open Document
358 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 1: Smtp Security Best Practices
Question 1 Answer:
1. Viruses
Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.
2. Spam
Spam is expected to increase to 80 to 90 percent of total email. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information. You can expect the occurrence of these spam-virus hybrids to increase and develop into even more dangerous and damaging threats
3. Directory Harvest Attacks (DHAs)
Also called "dictionary attacks," this technique steals proprietary information from corporate directories. During a DHA, spammers attempt to deliver messages to multiple addresses, such as johndoe@yourcompany.com, jdoe@yourcompany.com, and john@yourcompany.com. Addresses that are not rejected by the receiving mail server are determined to be valid. These addresses are compiled and sold to other spammers worldwide; companies who have had their email addresses harvested are vulnerable to an ever-growing amount of junk mail. An estimated 30 to 40 percent of inbound SMTP connections through the corporate mail gateway can be traced to DoS and DHA attacks. These threats can overwhelm mail transfer agents (email servers) to the point of shutdown.
Question 2 Answer:
1. Disable open relaying on all SMTP virtual servers.
2. Prevent anonymous access on internal SMTP virtual servers and dedicated SMTP virtual servers for IMAP and POP clients.
3. Digitally sign and encrypt your Email.

Question 3 Answer:
You are going to allow your remote users to relay mail via your mail server across the internet, as this will encrypt the username and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In addition to the already existing security layers, there should be an added layer specifically for incoming and outgoing emails.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the LAN domain, inform employees about email scams. Most users know not to open emails when on our system. Spam filters can help control junk email, so there is less risk of opening emails containing malware.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2670 Final Exam Paper

    • 408 Words
    • 2 Pages

    4) An email server uses MX and A records in DNS to determine the target email server to relay…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    3. In what scenario would you require TLS encryption? TLS encryption is used for the e-mail transmission while it is going across to another mail server. The other mail server could be across the internet or across your WAN.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3. Another SMTP Server security threat is malware. Malware is malicious software which can be in various forms such as trojans, viruses, spyware and worms. Malware is usually installed without the user’s consent. It can attack the user’s computer and then use the user’s computer to attack other computers. To help prevent the spread of malware, you can have firewalls and proper security software protection. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    6.) WAN Domain proposal: Scan all e-mail attachments for type, antivirus, and malicious software at the LAN-to-WAN Domain. Isolate and quarantine unknown file attachments until further security review is conducted. Provide security awareness training to remind employees of dangers…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ISSC362 Lab 2 Assessment

    • 492 Words
    • 2 Pages

    If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?…

    • 492 Words
    • 2 Pages
    Good Essays
  • Good Essays

    4. CYBERSECURITY. Cyber threats have amplified with the globalization of digital communications, increased reliance on computer networks, and convergence of technology. Cyber threats have also evolved. The risk is no longer from sophisticated nation states, but also from hackers, criminals, and terrorists.…

    • 798 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    iss project0

    • 376 Words
    • 1 Page

    2. Other than installing virus and worm control software, what can SLS do to prepare for the next…

    • 376 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    E-Mail Etiquette

    • 1104 Words
    • 5 Pages

    I remember opening my first e-mail account and thinking how much fun it was to send a message to a friend. However, most people now no longer find e-mail simple or fun. E-mail messaging now exceeds telephone traffic and is the dominant form of business communication. Some workers tell me that handling e-mail consumes half of their day. A recent Wall Street Journal report indicates that soon employees will spend three to four hours a day on e-mail.…

    • 1104 Words
    • 5 Pages
    Good Essays