top-rated free essay

NT2670 Unit 4 Assignment 1:SMTP Security Best Practices

By dustybill Apr 25, 2014 546 Words
NT2670 Unit 4 Assignment 1
4/20/2014

1. The first Threat is Viruses have been around for years, but that doesn't make them any less dangerous or easy to eradicate. New, more destructive viruses and worms are being unleashed at an alarming rate.

The Second threat is Spam. Spam is expected to increase to 80 to 90 percent of total email. Moreover, the boundary between spam and viruses is blurring. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information.

The third threat is known as Directory Harvest Attacks or also known as "dictionary attacks," this technique steals proprietary information from corporate directories. During a DHA, spammers attempt to deliver messages to multiple addresses, such as johndoe@yourcompany.com, jdoe@yourcompany.com, and john@yourcompany.com. Addresses that are not rejected by the receiving mail server are determined to be valid. A successful DHA can net a spammer thousands of corporate email addresses in just a few minutes.

2. 1) Disable open relaying on all SMTP virtual servers: Open relay on your Exchange Server allows other Email servers to use your server as a gateway to others. This allows others to send spam Email which appears to be originated from your address, therefore you will be identified as a spam source.

2) Prevent anonymous access on internal SMTP virtual servers and dedicated SMTP virtual servers for IMAP and POP clients: Because all Exchange servers within your organization authenticate with each other to send mail, you do not need to enable anonymous access on your internal Simple Mail Transfer Protocol (SMTP) virtual servers. Additionally, all Post Office Protocol (POP) and Internet Message Access Protocol (IMAP) clients authenticate with your SMTP virtual server, so anonymous access is not required on a server that is used exclusively by POP and IMAP clients.

3) Restricting Submissions to Distribution Lists and Users: Restrict who can send e-mail messages to an individual user or a distribution list. Restricting submissions on a distribution list prevents non-trusted senders, such as unauthorized Internet users, from sending mail to an internal-only distribution list.

3. TLS is encrytpion for the e-mail transmission while it is going across to another mail server. The other mail server could be across the internet or across your WAN. Use TLS for example is you are going to allow your remote users to relay mail via your mail server across the internet, as this will encrypt the username and password too for the smtp connection (if you implement this). If you send sensitive e-mails to your partners on a regular basis use TLS to send e-mail to them as this ensures the e-mail transmission from your smtp server to thier smtp server is encrypted. Finally use TLS to further protect your ActiveSync, OWA or RPC/HTTPS as opposed to using the weaker SSL.

Pros: the transmission is encrypted and hence a bit more secure, also you get a sort of confirmation especially between partners that the e-mail did come for the partner's server.

Cons: Slight load due to the encryption (but very slight), if you use an Internal CA to get the certificates from you need to give your public root cert to your partner so that they can trust your certs and viice versa.

Cite This Document

Related Documents

  • Unit 4 Assignment 1: Smtp Security Best Practices

    ...Question 1 Answer: 1. Viruses Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were ...

    Read More
  • assignment brief unit 1

    ...COURSE: BTEC Extended Diploma in Business (QCF) COHORT: 2014 - 2016 UNIT: 1 – The Business Environment (10 Credits) ASSIGNMENT 1 – Two Businesses on our Doorstep Learner Outcomes: 1. Know the range of different businesses and their ownership 2. Understand how businesses are organised to achieve their purposes Scenario: ...

    Read More
  • Assignment 1 level 4

    ... Stacey Shaw M/503/1232 Roles and Responsibilities and relationships in lifelong learning Level 4 The following paper aims to review to key roles and responsibilities and relationships in lifelong learning. The review will look in detail at the following areas: 1. I will aim to examine my own roles and responsibilities in lifelong learning 2...

    Read More
  • Unit 4 Assignment 1 IS3550

    ...used the personal data of a terminal cancer patient for identity theft. By 2008, 33,000 + complaints had been filed with OCR, only about 8,000 were investigated with 5,600 leading to corrective action, yet no fines had been issued. Several key dates for HIPAA since then are: February 17, 2009- ARRAs HITECH Act Signed into Law. HIPAA revised to s...

    Read More
  • Assignment #1: Best Practices

    ...January 4, 2013 BUS 5668: Cases in Applied Project Management Assignment #1: Best Practices From 1940 to present, Project Management has continuously advanced from line managers using a small set of processes that were considered nice to have to the formal assignment of one individual assigned as the Project Manager that utilized a formal me...

    Read More
  • Unit 4 Assignment 1

    ...Unit 4 Assignment 1 Chosen business: Tesco Task 1 (P1) There are different types of information that Tesco use these are: - Verbal information: This is spoken information it could come from the customer, it could also come from Tesco if they let any promotions over the tannoy. - Written information: This is information that is written in...

    Read More
  • Unit 4 Assignment 1

    ... Demonstrating effective leadership: Case study 28 – Smoking at the state Health Department Ricky Koya NHS5004 February 6, 2015 Dr. Jackie Heisler Demonstrating Effective Leadership Case study 28: Smoking at the state health department, leadership and ethical decisions are in question when Dr. Paul Billingsley takes over as leader of th...

    Read More
  • NT2670 Unit 2 Assignment

    ...Email and Web Services GRADED ASSIGNMENTS Unit 2 Assignment 1: Identifying HTML Tags Course Objectives and Learning Outcomes In this assignment, you will identify HTML tags. Assignment Requirements Evaluate the following scenario: In order to test your IIS server implementation you decide to create a test web site using HTML...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.