SlideShare a Scribd company logo
1 of 9
Chapter 14
Internet Services and Email
Chapter 14 Overview
Fundamentals of internet service, notably email
Email formatting and transmission
Email security issues
Enterprise firewalling and point of presence
Internet Services
Software that provides Layer 7 services
Not all Layer 7 services are end-user services
DNS – name translation for other services
DHCP – automated host configuration
Traditional internet applications
Many Internet applications were developed before security
problems became serious
Some date to the 1970s
Older applications: file transfer (FTP), remote terminals
(Telnet), finger protocol
Internet Email
Email with “@” address dates back to 1971
Developed for ARPANET hosts
Two types of Internet standards for email
Formatting standards – layout of email messages and how to
handle attachments
Protocol standards – how to exchange an email message/file
between hosts
Basic Email Format
MIME Formatting
“Multipurpose Internet Message Extension”
Traditional email contains 7-bit ASCII characters
Some email servers erase the eighth bit, or otherwise modify it
MIME provides a way to embed non-ASCII encoding in an
email message
Embeds images or complex documents
Formats messages using Web-style markup
Includes encrypted data or digital signatures
Email Protocols
Two Types of Protocols
Mailbox protocols – let a client program retrieve email from a
server
POP3 – a simple and popular protocol
IMAP – a more elaborate protocol
MAPI – Microsoft's Message API (Exchange)
Delivery protocols – transmit an email to another server for
delivery to its destination
Typically Simple Mail Transfer Protocol: SMTP
Tracking an Email: Servers
Tracking an Email: Headers
Is This Email Genuine?
Headers from the Suspect Email
Email Security Problems
Connection-based attacks
Large-scale sniffing risks
Many sites use SSL to encrypt email traffic
Spam
Unsolicited email; often distributes frauds
Phishing
Email that tries to retrieve authentication data
Email viruses
Messages that trick user into replicating them
Spam, Spam, Spam, Spam, Spam
A huge problem
Unsolicited email wastes bandwidth, server storage space,
server compute cycles
Typical spam involves fraudulent or illegal activities, or
products not accepted in normal advertising channels
Frauds
Advance fee fraud
Dubious stock investments
Spam Prevention and Control
Restrict access to mail servers
Whitelists – lists of email servers that actively avoid handling
spam
Blacklists – email servers that carry spam
Identify spam by pattern and filter it out
Binary matching – looks for an exact match with specific
features
Statistical matching – calculates likelihood that an email is
spam; filters on relative scores
Phishing
A social engineering attack
Email induces the recipient to visit a bogus website and provide
login credentials
Bogus banking site, ecommerce site, email site, etc.
Elements of a phishing attack
Spam email that takes users to the bogus site
Website that collects user's credentials
Domain name that carries the website
Email Viruses
Contains an executable attachment that propagates the virus if
the user runs it
The virus typically uses the user's email client to transmit the
virus to people in the user's email contact list
Recipients may treat the email as legitimate since it comes from
an acquaintance
Examples: Melissa, ILOVEYOU, Resume
Mechanisms: Microsoft Visual Basic, or binary executables
masquerading as other files
Email Chain Letters
An email that induces the recipient to forward it to a lot of
other people
Some are based on traditional paper-based chain letters (illegal
under Post Office rules)
Hoaxes – if recipients forward the email, some benefit arises
(donations to a cause, etc.)
Cancer examples
Virus hoaxes – emails that warn of a computer security risk and
recommend forwarding to everyone – not how we distribute
such warnings
Enterprise Firewalls
Provide access control at a site's gateway
Originally not intended as part of Internet
Now provides NAT and traffic filtering
Internet Access Policy Issues
How do employees use the Internet to get their work done?
What services does the enterprise offer to Internet users?
Internet-Related Risks
Risks posed by Internet access
Attacks on internal file servers and clients (#1)
Poor email service due to spam (#4)
Risks posed by a lack of Internet
Lost sales from lack of a website (#2)
Lack of email yields poor customer communication (#3)
Ineffective R&D, marketing, and purchasing staff due to lack of
browser access (#5)
A Simple Internet Policy
Controlling Internet Traffic
Host control
Restrict on sending or receiving address
Service control
Restrict on TCP or UDP port number
Direction control
Restrict according to whether the traffic was initiated inside or
outside of the site
Content control
Examine application-level data to detect violations of specific
restrictions
Filtering Internet Traffic
Traffic Filtering Mechanisms
Packet filtering
Examine individual packets
Make decisions on a per-packet basis
Session filtering
Establish a session based on socket address
Permit/deny based on source of session
Keep track of session status (i.e., TCP open)
Application filtering
Reconstruct application layer data and filter based on data
contents
Firewall Rule Format
Rules to Enforce Simple Policy
Enterprise Point of Presence (POP)
POP topology – how site connects to Internet
Single firewall, with optional bastion host
Three-legged firewall
Dual firewall
The DMZ – demilitarized zone
A military/political term for an internal LAN that accepts
inbound Internet connections
May be protected from the rest or the enterprise LAN via a
firewall
Single Firewall with Bastion Host
Three-Legged Firewall
Dual Firewall with DMZ
Attacking a Firewall
Protocol attacks
IP spoofing – bypassed firewall by masquerading as internal
traffic
Fragmentation attack – made first fragment too small to contain
the port number
Tunneling
Embed traffic inside a protocol that the firewall always passes,
like Web pages
Requires custom client and server
Some legitimate vendors use tunneling
image2.jpg
image3.jpg
image4.jpg
image5.jpg
image6.jpg
image7.jpg
image8.jpg
image9.jpg
image10.jpg
image11.jpg
image12.jpg
image13.jpg
image14.jpg
image1.jpg
Details:
Using the course text, professional journal articles, or other
reputable resources, and complete the assignment as listed
below.
First Part:
What is the main attraction of free email (other than
cost)? What are the risks associated with free email services?
Think back to basic cybersecurity principles.
Second Part (in the same document):
Describe a recent, successful phishing attack. Was the
email a free service? What was the organization and industry
sector (healthcare, gov, etc.)? How many records were
breached?
Paper Requirements:Format: Microsoft Word
Font: Arial, 12-Point, Double-Space (or equivalent)
Citation Style: APA or MLA (The point is to use a style
that makes your document readable and give credit to the
sources you used.)
Length Requirements:
2–3 pages
Coversheet
List of References Page.
Proofread - Edit for spelling, grammar, punctuation, etc.
Use only course text, professional journal articles, or other
reputable resources.

More Related Content

Similar to Chapter 14Internet Services and EmailChapter 14 Overview.docx

Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatelockyerj
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatesarah s
 
Modern Anti-Spam - Rejection, No Sorting (Version 2014)
Modern Anti-Spam - Rejection, No Sorting (Version 2014)Modern Anti-Spam - Rejection, No Sorting (Version 2014)
Modern Anti-Spam - Rejection, No Sorting (Version 2014)Thomas Stensitzki
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayandreasschuster
 
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)Harold Wong
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
 
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011SpamExperts
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01lonetree
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfSeethaDinesh
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
network security / information security
network security / information securitynetwork security / information security
network security / information securityRohan Choudhari
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview PptAntonio Ieranò
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptxYouTubeCONTRA
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat LandscapeNuspire Networks
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityHarold Wong
 
Web Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsWeb Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsPort80 Software
 

Similar to Chapter 14Internet Services and EmailChapter 14 Overview.docx (20)

Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Modern Anti-Spam - Rejection, No Sorting (Version 2014)
Modern Anti-Spam - Rejection, No Sorting (Version 2014)Modern Anti-Spam - Rejection, No Sorting (Version 2014)
Modern Anti-Spam - Rejection, No Sorting (Version 2014)
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gateway
 
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
E mail systems
E mail systemsE mail systems
E mail systems
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat Landscape
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 Security
 
Web Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsWeb Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future Musings
 

More from bartholomeocoombs

CompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze how human resource standards and practices.docxCompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze how human resource standards and practices.docxbartholomeocoombs
 
CompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze financial statements to assess performance.docxCompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze financial statements to assess performance.docxbartholomeocoombs
 
CompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docxCompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docxbartholomeocoombs
 
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docxCompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docxbartholomeocoombs
 
CompetencyAnalyze collaboration tools to support organizatio.docx
CompetencyAnalyze collaboration tools to support organizatio.docxCompetencyAnalyze collaboration tools to support organizatio.docx
CompetencyAnalyze collaboration tools to support organizatio.docxbartholomeocoombs
 
Competency Checklist and Professional Development Resources .docx
Competency Checklist and Professional Development Resources .docxCompetency Checklist and Professional Development Resources .docx
Competency Checklist and Professional Development Resources .docxbartholomeocoombs
 
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docxCompetency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docxbartholomeocoombs
 
Competency 2 Examine the organizational behavior within busines.docx
Competency 2 Examine the organizational behavior within busines.docxCompetency 2 Examine the organizational behavior within busines.docx
Competency 2 Examine the organizational behavior within busines.docxbartholomeocoombs
 
CompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesEvaluate the challenges and benefits of employ.docxCompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesEvaluate the challenges and benefits of employ.docxbartholomeocoombs
 
CompetenciesDescribe the supply chain management principle.docx
CompetenciesDescribe the supply chain management principle.docxCompetenciesDescribe the supply chain management principle.docx
CompetenciesDescribe the supply chain management principle.docxbartholomeocoombs
 
CompetenciesABCDF1.1 Create oral, written, or visual .docx
CompetenciesABCDF1.1 Create oral, written, or visual .docxCompetenciesABCDF1.1 Create oral, written, or visual .docx
CompetenciesABCDF1.1 Create oral, written, or visual .docxbartholomeocoombs
 
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docx
COMPETENCIES734.3.4  Healthcare Utilization and Finance.docxCOMPETENCIES734.3.4  Healthcare Utilization and Finance.docx
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docxbartholomeocoombs
 
Competencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeWhat competencies were you able to dev.docxCompetencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeWhat competencies were you able to dev.docxbartholomeocoombs
 
Competencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 parts.docxCompetencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 parts.docxbartholomeocoombs
 
Competencies and KnowledgeThis assignment has 2 partsWhat.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docxCompetencies and KnowledgeThis assignment has 2 partsWhat.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docxbartholomeocoombs
 
Competences, Learning Theories and MOOCsRecent Developments.docx
Competences, Learning Theories and MOOCsRecent Developments.docxCompetences, Learning Theories and MOOCsRecent Developments.docx
Competences, Learning Theories and MOOCsRecent Developments.docxbartholomeocoombs
 
Compensation  & Benefits Class 700 words with referencesA stra.docx
Compensation  & Benefits Class 700 words with referencesA stra.docxCompensation  & Benefits Class 700 words with referencesA stra.docx
Compensation  & Benefits Class 700 words with referencesA stra.docxbartholomeocoombs
 
Compensation, Benefits, Reward & Recognition Plan for V..docx
Compensation, Benefits, Reward & Recognition Plan for V..docxCompensation, Benefits, Reward & Recognition Plan for V..docx
Compensation, Benefits, Reward & Recognition Plan for V..docxbartholomeocoombs
 
Compete the following tablesTheoryKey figuresKey concepts o.docx
Compete the following tablesTheoryKey figuresKey concepts o.docxCompete the following tablesTheoryKey figuresKey concepts o.docx
Compete the following tablesTheoryKey figuresKey concepts o.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 

More from bartholomeocoombs (20)

CompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze how human resource standards and practices.docxCompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze how human resource standards and practices.docx
 
CompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze financial statements to assess performance.docxCompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze financial statements to assess performance.docx
 
CompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docxCompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docx
 
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docxCompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
 
CompetencyAnalyze collaboration tools to support organizatio.docx
CompetencyAnalyze collaboration tools to support organizatio.docxCompetencyAnalyze collaboration tools to support organizatio.docx
CompetencyAnalyze collaboration tools to support organizatio.docx
 
Competency Checklist and Professional Development Resources .docx
Competency Checklist and Professional Development Resources .docxCompetency Checklist and Professional Development Resources .docx
Competency Checklist and Professional Development Resources .docx
 
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docxCompetency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
 
Competency 2 Examine the organizational behavior within busines.docx
Competency 2 Examine the organizational behavior within busines.docxCompetency 2 Examine the organizational behavior within busines.docx
Competency 2 Examine the organizational behavior within busines.docx
 
CompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesEvaluate the challenges and benefits of employ.docxCompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesEvaluate the challenges and benefits of employ.docx
 
CompetenciesDescribe the supply chain management principle.docx
CompetenciesDescribe the supply chain management principle.docxCompetenciesDescribe the supply chain management principle.docx
CompetenciesDescribe the supply chain management principle.docx
 
CompetenciesABCDF1.1 Create oral, written, or visual .docx
CompetenciesABCDF1.1 Create oral, written, or visual .docxCompetenciesABCDF1.1 Create oral, written, or visual .docx
CompetenciesABCDF1.1 Create oral, written, or visual .docx
 
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docx
COMPETENCIES734.3.4  Healthcare Utilization and Finance.docxCOMPETENCIES734.3.4  Healthcare Utilization and Finance.docx
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docx
 
Competencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeWhat competencies were you able to dev.docxCompetencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeWhat competencies were you able to dev.docx
 
Competencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 parts.docxCompetencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 parts.docx
 
Competencies and KnowledgeThis assignment has 2 partsWhat.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docxCompetencies and KnowledgeThis assignment has 2 partsWhat.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docx
 
Competences, Learning Theories and MOOCsRecent Developments.docx
Competences, Learning Theories and MOOCsRecent Developments.docxCompetences, Learning Theories and MOOCsRecent Developments.docx
Competences, Learning Theories and MOOCsRecent Developments.docx
 
Compensation  & Benefits Class 700 words with referencesA stra.docx
Compensation  & Benefits Class 700 words with referencesA stra.docxCompensation  & Benefits Class 700 words with referencesA stra.docx
Compensation  & Benefits Class 700 words with referencesA stra.docx
 
Compensation, Benefits, Reward & Recognition Plan for V..docx
Compensation, Benefits, Reward & Recognition Plan for V..docxCompensation, Benefits, Reward & Recognition Plan for V..docx
Compensation, Benefits, Reward & Recognition Plan for V..docx
 
Compete the following tablesTheoryKey figuresKey concepts o.docx
Compete the following tablesTheoryKey figuresKey concepts o.docxCompete the following tablesTheoryKey figuresKey concepts o.docx
Compete the following tablesTheoryKey figuresKey concepts o.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Chapter 14Internet Services and EmailChapter 14 Overview.docx

  • 1. Chapter 14 Internet Services and Email Chapter 14 Overview Fundamentals of internet service, notably email Email formatting and transmission Email security issues Enterprise firewalling and point of presence Internet Services Software that provides Layer 7 services Not all Layer 7 services are end-user services DNS – name translation for other services DHCP – automated host configuration Traditional internet applications Many Internet applications were developed before security problems became serious Some date to the 1970s Older applications: file transfer (FTP), remote terminals (Telnet), finger protocol Internet Email Email with “@” address dates back to 1971 Developed for ARPANET hosts Two types of Internet standards for email Formatting standards – layout of email messages and how to handle attachments Protocol standards – how to exchange an email message/file between hosts
  • 2. Basic Email Format MIME Formatting “Multipurpose Internet Message Extension” Traditional email contains 7-bit ASCII characters Some email servers erase the eighth bit, or otherwise modify it MIME provides a way to embed non-ASCII encoding in an email message Embeds images or complex documents Formats messages using Web-style markup Includes encrypted data or digital signatures Email Protocols Two Types of Protocols Mailbox protocols – let a client program retrieve email from a server POP3 – a simple and popular protocol IMAP – a more elaborate protocol MAPI – Microsoft's Message API (Exchange) Delivery protocols – transmit an email to another server for delivery to its destination Typically Simple Mail Transfer Protocol: SMTP Tracking an Email: Servers Tracking an Email: Headers
  • 3. Is This Email Genuine? Headers from the Suspect Email Email Security Problems Connection-based attacks Large-scale sniffing risks Many sites use SSL to encrypt email traffic Spam Unsolicited email; often distributes frauds Phishing Email that tries to retrieve authentication data Email viruses Messages that trick user into replicating them Spam, Spam, Spam, Spam, Spam A huge problem Unsolicited email wastes bandwidth, server storage space, server compute cycles Typical spam involves fraudulent or illegal activities, or products not accepted in normal advertising channels Frauds Advance fee fraud Dubious stock investments Spam Prevention and Control Restrict access to mail servers Whitelists – lists of email servers that actively avoid handling spam Blacklists – email servers that carry spam
  • 4. Identify spam by pattern and filter it out Binary matching – looks for an exact match with specific features Statistical matching – calculates likelihood that an email is spam; filters on relative scores Phishing A social engineering attack Email induces the recipient to visit a bogus website and provide login credentials Bogus banking site, ecommerce site, email site, etc. Elements of a phishing attack Spam email that takes users to the bogus site Website that collects user's credentials Domain name that carries the website Email Viruses Contains an executable attachment that propagates the virus if the user runs it The virus typically uses the user's email client to transmit the virus to people in the user's email contact list Recipients may treat the email as legitimate since it comes from an acquaintance Examples: Melissa, ILOVEYOU, Resume Mechanisms: Microsoft Visual Basic, or binary executables masquerading as other files Email Chain Letters An email that induces the recipient to forward it to a lot of other people Some are based on traditional paper-based chain letters (illegal under Post Office rules) Hoaxes – if recipients forward the email, some benefit arises
  • 5. (donations to a cause, etc.) Cancer examples Virus hoaxes – emails that warn of a computer security risk and recommend forwarding to everyone – not how we distribute such warnings Enterprise Firewalls Provide access control at a site's gateway Originally not intended as part of Internet Now provides NAT and traffic filtering Internet Access Policy Issues How do employees use the Internet to get their work done? What services does the enterprise offer to Internet users? Internet-Related Risks Risks posed by Internet access Attacks on internal file servers and clients (#1) Poor email service due to spam (#4) Risks posed by a lack of Internet Lost sales from lack of a website (#2) Lack of email yields poor customer communication (#3) Ineffective R&D, marketing, and purchasing staff due to lack of browser access (#5) A Simple Internet Policy Controlling Internet Traffic Host control Restrict on sending or receiving address Service control Restrict on TCP or UDP port number
  • 6. Direction control Restrict according to whether the traffic was initiated inside or outside of the site Content control Examine application-level data to detect violations of specific restrictions Filtering Internet Traffic Traffic Filtering Mechanisms Packet filtering Examine individual packets Make decisions on a per-packet basis Session filtering Establish a session based on socket address Permit/deny based on source of session Keep track of session status (i.e., TCP open) Application filtering Reconstruct application layer data and filter based on data contents Firewall Rule Format Rules to Enforce Simple Policy Enterprise Point of Presence (POP) POP topology – how site connects to Internet Single firewall, with optional bastion host
  • 7. Three-legged firewall Dual firewall The DMZ – demilitarized zone A military/political term for an internal LAN that accepts inbound Internet connections May be protected from the rest or the enterprise LAN via a firewall Single Firewall with Bastion Host Three-Legged Firewall Dual Firewall with DMZ Attacking a Firewall Protocol attacks IP spoofing – bypassed firewall by masquerading as internal traffic Fragmentation attack – made first fragment too small to contain the port number Tunneling Embed traffic inside a protocol that the firewall always passes, like Web pages Requires custom client and server Some legitimate vendors use tunneling image2.jpg image3.jpg image4.jpg
  • 8. image5.jpg image6.jpg image7.jpg image8.jpg image9.jpg image10.jpg image11.jpg image12.jpg image13.jpg image14.jpg image1.jpg Details: Using the course text, professional journal articles, or other reputable resources, and complete the assignment as listed below. First Part: What is the main attraction of free email (other than cost)? What are the risks associated with free email services? Think back to basic cybersecurity principles. Second Part (in the same document): Describe a recent, successful phishing attack. Was the email a free service? What was the organization and industry sector (healthcare, gov, etc.)? How many records were breached? Paper Requirements:Format: Microsoft Word Font: Arial, 12-Point, Double-Space (or equivalent) Citation Style: APA or MLA (The point is to use a style
  • 9. that makes your document readable and give credit to the sources you used.) Length Requirements: 2–3 pages Coversheet List of References Page. Proofread - Edit for spelling, grammar, punctuation, etc. Use only course text, professional journal articles, or other reputable resources.