Premium Essay

Unit 4 Assignment: Smtp Security

In:

Submitted By tylerholes
Words 337
Pages 2
04/16/14

NT2670, Email and Web
Unit 4 Assignment: SMTP Security
1. List and describe three SMTP server security threats?
a. Viruses can erase files, cause computer crashes and destroy information or get information.
b. Spam email is a term used to describe messages sent in bulk or incoming emails that are received without consent.
c. Directory harvest attacks (DHAs) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database.
2. List three suggestions to harden SMTP server security?
a. “Disable open relaying on all SMTP virtual servers: Open relay on your Exchange Server allows other Email servers to use your server as a gateway to others. This allows others to send spam Email which appears to be originated from your address, therefore you will be identified as a spam source.” (Ehamouda, 2009)
b. “Prevent anonymous access on internal SMTP virtual servers and dedicated SMTP virtual servers for IMAP and POP clients: Because all Exchange servers within your organization authenticate with each other to send mail, you do not need to enable anonymous access on your internal Simple Mail Transfer Protocol (SMTP) virtual servers. Additionally, all Post Office Protocol (POP) and Internet Message Access Protocol (IMAP) clients authenticate with your SMTP virtual server, so anonymous access is not required on a server that is used exclusively by POP and IMAP clients.” (Ehamouda, 2009)
c. “Restricting Submissions to Distribution Lists and Users: Restrict who can send e-mail messages to an individual user or a distribution list. Restricting submissions on a distribution list prevents non-trusted senders, such as unauthorized Internet users, from sending mail to an internal-only distribution list.” (Ehamouda, 2009)
3. In what scenario would you require TLS encryption?
a. Whenever you are sending

Similar Documents

Free Essay

Nt 2670 Unit 4 Homework Assignment

...UNIT 4 HW Assignment 1. List and describe three SMTP server security threats. A1: brute force attack. This security threat is identified by the way in which the attacker tries to break security. This is done by trying to guess the password through the mail server or other service working on your system using software that will use all possible combinations for the password until it guesses the correct one. A2: denial-of-service also known as DoS. This attack will shut off access to your site. The attacker will increase traffic on your site. The increased traffic will cause your site to become unresponsive and shut down. A3: malware. Malware is malicious software which can be in various forms such as Trojans, viruses, spyware and worms. Malware is usually installed without the user’s consent. It can attack the user’s computer and then use the user’s computer to attack other computers. To help prevent the spread of malware, you can have firewalls and proper security software protection. 2. List three suggestions to harden SMTP server security. A1: Digitally sign and encrypt your Email. By doing this you will prevent others from the ability to open and read your email. This will ensure that it is only opened by the person you sent it to. A2: Backup your Exchange server periodically. By doing this you will have copies of everything on your computer to use in case you need to reinstall if your computer crashes due to an attack. A3: Deploy Front End Server: Deploy...

Words: 286 - Pages: 2

Free Essay

Student

...Application Services and Security Course Revision Table Footer Date: 09/30/07 10/10/07 Section: All All Reason for Change: New Curriculum QA Edits Implementation Date: December 2007 December 2007 © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys [Exam I —Unit 6] DATE: ________________________________ STUDENT NAME: ________________________________ COURSE NUMBER: ________________________________ INSTRUCTOR: ________________________________ ITT COLLEGE: ________________________________ General Instructions: 1. This is a closed-book, closed-notes Exam. No reference material (including assignments and lab) will be permitted for use during the exam session. 2. The exam contains true/false and multiple choice types of questions. 3. Please use the separate answer sheet provided to you for marking your answers. 4. Each question is worth two points. Good luck! © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys 1. The most common cause of security breaches is ______. a. no alarm system b. weak passwords c. untrained security guards d. poor perimeter lighting 2. Windows Server administrators should not use the Administrator account for everyday activity. They should use the ________ command, only when performing administrative functions. a. super user b. run as c. task manager d. power user 3. For organizations with wireless networks, deployment of ________ is necessary to vastly increase the security of the wireless access...

Words: 3277 - Pages: 14

Premium Essay

Sam Doc

...Qualification: | BTEC National Level 3 | Certificate | Subject: | Information Technology | Unit number + Title | 8. E-Commerce | Assignment number + Title: | 1. Why E-Commerce? | Assessment Criteria: | P1 P2 P3 M1 M2 D1 | Purpose / Aims (learning outcomes) | LO1 Understand the web architecture & componentsP1 Describe the technologies required for e-commerceP2 Explain the impact of introducing an e-commerce system to an organisationP3 Explain the potential risks to an organisation of committing to an e-commerce systemM1 Recommend methods to promote an e-commerce systemM2 Discuss how security issues in e-commerce can be overcomeD1 Evaluate the use of e-commerce in a ‘brick & click’ organisation | Introduction (Scenario) | You work for a firm of e-commerce consultants in the West Midlands and have been asked to provide a ‘guide to e-commerce’ leaflet for a local retail business considering e-commerce. Your guide will cover the regulations related to e-commerce and the implications of e-commerce on society. You will also put together an e-commerce strategy for the business. | Assignment 1 (Scenario) | You visit the Managing Director of your local retail business to go over what is needed for e-commerce, including the different technologies to be bought. The MD is not very IT literate and therefore you need to explain the different hardware & software and networking technologies needed for e-commerce...

Words: 2603 - Pages: 11

Premium Essay

Load Balance

...Load Balancing Microsoft Exchange 2013 Deployment Guide v1.0.19 Copyright © 2014 Loadbalancer.org, Inc. 1 Table of Contents About this Guide............................................................................................................................................... 4 Appliances Supported....................................................................................................................................... 4 Microsoft Exchange Software Versions Supported...........................................................................................4 Loadbalancer.org Software Versions Supported............................................................................................... 4 Exchange Server 2013..................................................................................................................................... 5 Exchange 2013 Server Roles........................................................................................................................... 5 Load Balancing Exchange 2013....................................................................................................................... 6 Load Balancing & HA Requirements............................................................................................................ 6 Client Access Array................................................................................................................................. 6 Database Availability...

Words: 8763 - Pages: 36

Premium Essay

Richdash

...|ELECTRONIC BUSINESS | | | |STUDY GUIDE FOR | |INYM 225 MEC | |*INYM225MEC* | |FACULTY OF COMMERCE AND ADMINISTRATION | |MAFIKENG CAMPUS | Study guide compiled by: Ms S.T. Nthutang Instructional Design by Mrs Annelize Cronje,Senior Academic Development Advisor, ADC Page layout by Roxanne Bremner, Academic Development Centre Printing arrangements and distribution by Department Logistics (Distribution Centre). Printed by Nashua Digidoc Centre (018) 299 2827 Copyright ( 2014 edition. Date of revision 2016. North-West University, Mafikeng Campus. No part of this book may be reproduced in any form or by any means without written permission from the publisher TABLE OF CONTENTS Module information vii Study guide title: Electronic Business vii Module qualification:...

Words: 8803 - Pages: 36

Free Essay

Vulnerability Assess

...active subscription to the Nessus Feed in order to be compliant with our license agreement: http://www.tenable.com/products/nessus Table Of Contents Hosts Summary (Executive).................................................................................................4 •kupangkota.go.id..........................................................................................................................................................5 Vulnerabilities By Host......................................................................................................... 7 •kupangkota.go.id..........................................................................................................................................................8 Vulnerabilities By Plugin.....................................................................................................64 •51192 (6) - SSL Certificate Cannot Be Trusted....................................................................................................... 65 •57582 (6) - SSL Self-Signed Certificate................................................................................................................... 67 •54582 (2) - SMTP Service Cleartext Login Permitted.............................................................................................. 69 •34324 (1) - FTP Supports Clear Text Authentication................................................................................................

Words: 29406 - Pages: 118

Premium Essay

Myself

...------------------------------------------------- OSI model From Wikipedia, the free encyclopedia OSI model | 7. Application Layer | NNTP  · SIP  · SSI  · DNS  · FTP  · Gopher · HTTP  · NFS  · NTP  · SMPP  · SMTP  ·DHCP  · SNMP  · Telnet  · Netconf  ·(more) | 6. Presentation Layer | MIME  · XDR  · TLS  · SSL | 5. Session Layer | Named Pipes  · NetBIOS  · SAP  · L2TP  ·PPTP | 4. Transport Layer | TCP  · UDP  · SCTP  · DCCP  · SPX | 3. Network Layer | IP (IPv4, IPv6)  · ICMP  · IPsec  · IGMP  ·IPX  · AppleTalk | 2. Data Link Layer | ATM  · SDLC  · HDLC  · ARP  · CSLIP  ·SLIP  · PLIP  · IEEE 802.3  · Frame Relay · ITU-T G.hn DLL  · PPP  · X.25 | 1. Physical Layer | EIA/TIA-232  · EIA/TIA-449  · ITU-T V-Series  · I.430  · I.431  · POTS  · PDH  ·SONET/SDH  · PON  · OTN  · DSL  ·IEEE 802.3  · IEEE 802.11  · IEEE 802.15 · IEEE 802.16  · IEEE 1394  · ITU-T G.hn PHY  · USB  · Bluetooth · Blue | This box: view · talk · edit | The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller parts called layers. A layer is a collection of similar functions that provide services to the layer above it and receives services from the layer below it. On each layer, an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides...

Words: 3915 - Pages: 16

Premium Essay

It245-Intro to Network Management

...Introduction to Network Management Phase 5: Network Security & Network Management Network User Guide Final Version Gabriel B. Del Fierro IT245-1304B, Introduction to Network Management Instructor: Brian Rodgers December 23, 2013 Executive Summary The purpose of this user guide is to familiarize you the Casa Del Fierro organization, what their needs are within this Network Organization. Contained in the following pages will provide you with all of the pertinent information that you will need in order to provide the highest quality of service and care. “An ounce of prevention is better than a pound of cure” – B. Franklin.   Table of Contents IT245-1303B-01 Network Project Plan Executive Summary 1 Table of Contents 2 Section 1: Introduction of the Organization and its Requirements 4 Section 2: Network Architecture Design 6 Section 3: Network Model or Stack to be Used 8 Section 4: Network Protocols 15 Section 5: Network Security 19 Section 6: Network Management 22 References 24 Section 1: The Organization & It’s Network Requirements The Casa Del Fierro is a small organization with a total of two main users with a few friends and family that comes to visit on holidays. Although this network is set up in a comfortable home, individual needs may vary. The internet is used on a daily basis, Streaming Movies along with music, Online School, Social Media, Games, Online Banking and accessing medical care records. The devices to be networked...

Words: 5562 - Pages: 23

Premium Essay

Computer Networking

...COMPUTER NETWORKING SIXTH EDITION A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Editorial Assistant: Emma Snider Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell Art Director, Cover: Anthony Gemmellaro Art Coordinator: Janet Theurer/ Theurer Briggs Design Art Studio: Patrice Rossi Calkin/ Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: ©Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of...

Words: 69922 - Pages: 280

Premium Essay

Network & Telecommunication Concepts

...Running Head: Week 1, Individual Assignment; TCP/IP Architecture and OSI Layers TCP/IP Architecture and OSI Layers [your name here] NTC360 Network and Telecommunications Concept Associate Professor Anthony Bruno January 04, 2011 The purpose of this paper is to describe an OSI (Open Systems Interconnection) Model with details about each of the seven layers. The OSI reference model adopts a layered approach, where a communication subsystem is broken down into seven layers, each one of which performs a well-defined function. Additionally it is important to understand the purpose of the OSI model in the overall networking architecture especially as it relates to the TCP/IP (Transmission Control Protocol/Internet Protocol) Architecture, which also consists of layers each playing a particular role in the networking design. Generally speaking, the network protocol layer, which is similar to the data and network layer of the OSI model includes the protocols that allow clients and applications to send data over the network. This includes TCP/IP, NWLink (IPX/SPX), NetBEUI, Infrared Data Association (IrDA). However, the purpose of this document is to focus on the relationships between the OSI model and the TCP/IP architectures, and how they may interact together. Finally, as demonstration of this relationship a visual diagram has been provided to depicts how the TCP/IP layers correspond to the OSI model and layers. To begin with...

Words: 1573 - Pages: 7

Premium Essay

Nmap.Cookbook.the.Fat-Free.Guide.to.Network.Scanning

...Hat® is a registered trademark of Red Hat, Inc. Ubuntu® is a registered trademark of Canonical Ltd. UNIX® is a registered trademark of The Open Group All other trademarks used in this book are property of their respective owners. Use of any trademark in this book does not constitute an affiliation with or endorsement from the trademark holder. All information in this book is presented on an “as-is” basis. No warranty or guarantee is provided and the author and/or publisher shall not be held liable for any loss or damage. 3 4 Contents at a Glance Introduction....................................................................................... 15 Section 1: Installing Nmap .................................................................. 19 Section 2: Basic Scanning Techniques .................................................. 33 Section 3: Discovery Options .............................................................. 45 Section 4: Advanced Scanning Options................................................ 65 Section 5: Port Scanning Options...

Words: 25175 - Pages: 101

Free Essay

Networking

...GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERsity | Assignment 01 | Advanced Network and Security | | ICT/12/0121 WMIL Wasalage | 9/23/2013 | | Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Table of Contents Abstract 01 Acknowledgement 02 Table of Content 03 List of Figures 04 1.0 Introduction to ISO OSI Reference Model 05 1.1 Physical Layer 07 1.2 Data Link Layer 08 1.3 Network Layer 10 1.4 Transport Layer 11 ...

Words: 5991 - Pages: 24

Premium Essay

Jon Jons

...channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions. Use this link to answer the following questions: Which versions support Tilt and 3D rotation? __________________________ Which Google Earth version supports the highest resolution? __________________________ To use Google Earth, version 4, minimum computer hardware requirements must be met: Operating System CPU System Memory (RAM) Hard Disk Network Speed Graphics Card Screen Microsoft...

Words: 60675 - Pages: 243

Free Essay

Hitachi Virtual Storage Platform

...Hitachi Virtual Storage Platform Hitachi Storage Navigator User Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-90RD7027-00 Copyright © 2010 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. (hereinafter referred to as “Hitachi”) and Hitachi Data Systems Corporation (hereinafter referred to as “Hitachi Data Systems”). Hitachi and Hitachi Data Systems reserve the right to make changes to this document at any time without notice and assume no responsibility for its use. This document contains the most current information available at the time of publication. When new and/or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document may not be currently available. Refer to the most recent product announcement or contact your local Hitachi Data Systems sales office for information about feature and product availability. Notice: Hitachi Data Systems products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems agreement(s). The use of Hitachi Data Systems products is governed by the terms of your agreement(s) with Hitachi Data Systems. Hitachi...

Words: 42378 - Pages: 170

Free Essay

Cisco Ccnp Security Training

...............................109 Chapter 4 Deploying Clientless RemoteAccess SSL VPN Solutions ................148 Chapter 5 Deploying Advanced Cisco ASA VPN Solutions .............................184 CCNP Security VPN 642-648 Quick Reference Cristian Matei ciscopress.com [2] CCNP Security VPN 642-648 Quick Reference About the Author Cristian Matei, CCIE No. 23684, is a senior security consultant for Datanet Systems, Cisco Gold Partner in Romania. He has designed, implemented, and maintained multiple large enterprise networks, covering the Cisco security, routing, switching, service provider, and wireless portfolios of products. Cristian started this journey back in 2005 with Microsoft technology and finished the MCSE Security and MCSE Messaging tracks. He then joined Datanet Systems, where he quickly obtained his Security and Routing & Switching CCIE, among other certifications and specializations, such as CCNP, CCSP, and CCDP. Cristian has been a Cisco Certified Systems Instructor (CCSI) since 2007, teaching CCNA, CCNP, and CCSP curriculum courses. In 2009, he received a Cisco Trusted Technical Advisor (TTA) award and became certified as a Cisco IronPort Certified Security Professional (CICSP) on E-mail and Web. That same year, he started his collaboration with Internetwork Expert as a technical editor on the CCIE Routing & Switching and Security Workbook series. In 2010, he received his ISACA Certified Information Security Manager (CISM) certification. He is currently...

Words: 52748 - Pages: 211