Mail address forms of an organisation

Individual Exercises from the Textbook: Answer the questions in depth Make a list of mail address forms that your organization (feel free to make up an organization for this) and write a set of rules for parsing them. POP3 separates message retrieval and deletion by allowing a user to retrieve and view a message without deleting it from the permanent mailbox. What are the advantages and disadvantages of such separation? How does the TOP command operate and why is it useful? How can a UNIX sendmail program be used to implement a mail gateway? Many sites that use a bastion host arrange for software to scan all incoming files before admitting them to the organization. Why do organizations scan files? Read the description of a packet filter for a commercially available router. What features does it offer? Most users are not aware that SMTP transfers messages in ASCII, and that anyone watching network traffic can see the contents of an email message. How could you secure sensitive information when transmitting via SMTP so ASCII contents are not revealed? Can a firewall be combined with a NAT? What are the consequences? Note: You need to expand your answers to include examples, case studies, compare/contrasts, etc. you need at least 3 sentences to form a complete paragraph, so every paragraph make sure you have at least 3 sentences with breadth and depth, and every definition should have a citation/resource referenced. Note: Strictly No copy paste, Plagiarism results in course termination. Please include references, and cite the sourses, please do the assignment in APA FORMATE.

Sample Solution

       

Individual Exercises:

1. Mail Address Forms and Parsing Rules:

Organization: GreenTech Solutions, an environmental consulting firm.

Mail Address Forms:

  • [email address removed]: This is the standard format for employees.
  • [email address removed]: Used for generic inquiries directed to specific departments (e.g., [email address removed], [email address removed]).
  • [Project_name][email address removed]: Used for temporary addresses associated with specific projects.

Parsing Rules:

  1. Identify the domain name: Look for the string "@green-tech.com" at the end of the address.
  2. Extract username:
    • If the domain is preceded by a single period (".") and a string, consider it the username (e.g., "[email address removed]").
    • Otherwise, if the domain is preceded by two underscores ("__") and a string, consider it a department name (e.g., "[email address removed]").
    • Otherwise, if the domain is preceded by an underscore ("") and a string followed by another underscore (""), consider it a project team name (e.g., "[email address removed]").

Full Answer Section

       

2. POP3: Advantages and Disadvantages:

POP3 (Post Office Protocol 3) separates message retrieval and deletion, offering advantages and disadvantages:

Advantages:

  • Offline access: Downloaded messages can be accessed and read even without an internet connection, increasing user convenience.
  • Reduced server load: Messages are removed from the server after download, freeing up storage space and reducing load.
  • Flexibility: Users can choose which messages to download and manage them locally.

Disadvantages:

  • Potential for message loss: If a message is deleted locally before downloading, it's permanently lost.
  • Redundancy issues: Duplicates can occur if messages are downloaded on multiple devices.
  • Security concerns: Downloaded messages are not as secure as those stored on the server.

3. TOP Command:

The TOP command in POP3 allows retrieving only the header or a specific number of lines from a message body. It operates by specifying the message number and the number of lines to retrieve.

Example: TOP 10 0 retrieves the first 10 lines (including the header) of message number 1.

Benefits:

  • Efficiency: Saves bandwidth and processing time by downloading only necessary information, particularly for large message bodies.
  • Previewing: Allows users to quickly check message content before downloading the entire message.

4. Sendmail as a Mail Gateway:

Sendmail is a popular mail transfer agent (MTA) on Unix-based systems. It can be used to implement a mail gateway, a server that relays email between different networks. Here's how:

  • Configuration: Sendmail is configured to receive emails from one network and forward them to another network using specific routing rules.
  • Routing rules: These rules define how emails are forwarded based on sender, recipient, domain, or other criteria.
  • Security: Gateways can implement security measures like spam filtering and virus scanning to protect the internal network.

Example: A company using an internal email server can configure Sendmail as a gateway to route incoming emails from the internet to the internal server based on recipient addresses.

5. Reasons for File Scanning:

Organizations scan incoming files for various reasons:

  • Malware prevention: Identify and block viruses, worms, and other malicious software that can harm systems and data.
  • Spam filtering: Detect and block unsolicited bulk emails that can overload resources and pose security risks.
  • Data security: Prevent unauthorized access to sensitive information contained in files.
  • Compliance: Adhere to industry regulations or internal policies regarding data security and privacy.

6. Packet Filter Features:

Packet filters are software-based firewalls that analyze incoming and outgoing network traffic based on predefined rules. Common features include:

  • Protocol filtering: Allows or blocks traffic based on protocols like TCP, UDP, or ICMP.
  • Port filtering: Allows or blocks traffic based on the destination or source port number associated with specific applications.
  • Address filtering: Allows or blocks traffic based on the IP address of the sender or receiver.
  • Content filtering: Analyzes the content of packets to identify and block malicious code or inappropriate content.

7. Securing Sensitive Information in SMTP:

Simple Mail Transfer Protocol (SMTP) transmits email messages in plain text, making them vulnerable to interception. To secure sensitive information:

  • Encryption in transit: Use protocols like TLS (Transport Layer Security) or SSL (Secure Sockets Layer)

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS