Preview

Nt2670 Unit 4 Assignment 1 Essay Example

Satisfactory Essays
Open Document
Open Document
487 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt2670 Unit 4 Assignment 1 Essay Example
NT2670 CRUZ UNIT 4 ASSIGNMENT1: SMTP Security Best Practices
The following are 3 security threats to SMTP Server: 1. One SMTP Server security threat is called a brute force attack. This security threat is identified by the way in which the attacker tries to break security. This is done by trying to guess the password through the mail server or other service working on your system using software that will use all possible combinations for the password until it guesses the correct one. (Hampton, 2011) 2. Another SMTP Server security threat is denial-of-service also known as DoS. This attack will shut off access to your site. The attacker will increase traffic on your site. The increased traffic will cause your site to become unresponsive and shut down. (Hampton, 2011) 3. Another SMTP Server security threat is malware. Malware is malicious software which can be in various forms such as trojans, viruses, spyware and worms. Malware is usually installed without the user’s consent. It can attack the user’s computer and then use the user’s computer to attack other computers. To help prevent the spread of malware, you can have firewalls and proper security software protection. (Hampton, 2011)

The following are 3 suggestions to harden SMTP Server security: 1. Digitally sign and Encrypt your Email. By doing this you will prevent others from the ability to open and read your email. This will ensure that it is only opened by the person you sent it to. (Ehamouda, 2009) 2. Backup your Exchange server periodically. By doing this you will have copies of everything on your computer to use in case you need to reinstall if your computer crashes due to an attack. (Ehamouda, 2009) 3. Deploy Front End Server: Deploy a Front End Server on the DMZ, and close unused ports on the DMZ. Here are the ports most used by Exchange services:
SMTP 25
DNS 53
HTTP 80
Kerberos 88
POP3 110
NNTP 119
RPC EndPoint Mapper 135
IMAP4 143
LDAP 389
Global Catalog 3268 /9

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In addition to the already existing security layers, there should be an added layer specifically for incoming and outgoing emails.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers.…

    • 235 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According to the scan we have, we have a bunch of difference services that we use. Simple Mail Transfer Protocol (SMTP) is how our employees sent their mail. Post Office Protocol (POP) is the services on how we receive them. These are both important in any business so they could send and receive messages so I would not recommend closing them.…

    • 329 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Configure routers and firewalls to deny all ping requests to reduce chances of DOS attacks and setup redundant internet connections to increase availability. Scanning of all email for malicious software and isolate anything that is…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2) Prevent anonymous access on internal SMTP virtual servers and dedicated SMTP virtual servers for IMAP and POP clients: Because all Exchange servers within your organization authenticate with each other to send mail, you do not need to enable anonymous access on your internal Simple Mail Transfer Protocol (SMTP) virtual servers. Additionally, all Post Office Protocol (POP) and Internet Message Access Protocol (IMAP) clients authenticate with your SMTP virtual server, so anonymous access is not required on a server that is used exclusively by POP and IMAP…

    • 546 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Denial of services is an attack on networks that are intended at making computer or particular service on a computer unavailable.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    b. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Emails can be hacked by various methods, and no one is immune. Recently even Presidents G.H. and G.W. Bush have had their emails hacked and information downloaded (Kim, 2013), (Rumors, 2013). By using different methods and the internet, Hackers are using Social Engineering, Google Hacking and Workplace Sabotage from a disgruntled former employee or ones who feels that they have an injustice done to them and are motivated for revenge (Link, 2013).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Good Essays

    | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It 260 Final Exam Review

    • 300 Words
    • 2 Pages

    22. Know the diff groups and what they can be used for regarding mailbox operations…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS 3110 lab 4 questions

    • 403 Words
    • 2 Pages

    a) User downloads and clicks on an unknown e-mail attachment. – Restrict user access and set it up so the user has to get authorization for downloads…

    • 403 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    To begin one of the most basic types of possible threats can come from what is called an IP sweep. What an IP sweep basically is a broad area ping that allows the user to determine what hosts if any exist on a network given a certain IP address range. A normal ping consists of a single hello message from one computer to the receiving computer. A ping sweep pings any and all computer to determine which are alive so that the attacker can figure out where he can attack the network.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Mah, P. (2012, January 31). 5 Steps to Protect Exchange Server from Security Attacks. Retrieved July 25, 2012, from…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Email Bomb Attacks

    • 102 Words
    • 1 Page

    One variation on the mail bomb automatically subscribes a targeted user to hundreds or thousands of high volume Internet mailing lists, which fill the user’s mailbox and / or mail server. Bombers call this attack list linking. Examples of these mail bomb programs comprises of Unabomber, Extreme Mail, Avalanche, Voodoo, and Kaboom.…

    • 102 Words
    • 1 Page
    Good Essays