Question

In: Computer Science

A consultant has recommended your organization look to increase its security profile in relation to SMTP...

A consultant has recommended your organization look to increase its security profile in relation to SMTP traffic. Management has asked you devise a firewall-specific strategy to address the recommendation. What strategy would you recommend, and why? Your answer should be approximately 200-250 words in length

Use your own words. Please do not copy and paste or use an answer already posted on Chegg

Solutions

Expert Solution

SMTP is generally a store and foreward protocol,it is well suited for proxying.because any well suited SMTP server can be a proxy it is hard to seperate from proxy, so many of them direct SMTP connection to a bastion host running a secure SMTP server that is the proxy.

Configuring Firewall strategic stratergy

1)Use DNS mail exchange mx records to specify that ur mails are directed to bastion host.

2)On the Bastion host configure the mailer to check the destination address receives in it .So every mail it receives should go throgh this if the mail is sent to external host then it should see it as unusual and if the mail is sent to the internal server it should be good to go .

3) and configure your internal system to send all out going mail to bastian host

4)we may also configure the system to send all the emails with a central email adrress like a company name or enterprise name instead of individual names as a return address

5)The reason or advantage for above point is when you kept central address it will be passed throgh the bastian host and it wont remove any necessary information .it will gurantee you the best service.


Related Solutions

A consultant has recommended your organization look to increase its security profile in relation to SMTP...
A consultant has recommended your organization look to increase its security profile in relation to SMTP traffic. Management has asked you devise a firewall-specific strategy to address the recommendation. What strategy would you recommend, and why? Your answer should be approximately 200-250 words in length. Please use your own words. Do not copy and paste from other Chegg answers or the internet.
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift? could u recalculate using 1 probability i think the probability is p(4 breaches tom | 2...
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift?
As you increase the security of your network, you are concerned that the added security measures...
As you increase the security of your network, you are concerned that the added security measures may impact in ways you had not intended. For example, how could a firewall have a negative impact on business from the following list? Explain It can filter packets from a site known to cause DoS attacks. It can filter packets that have a virus signature. It can block traffic that should be allowed through. It can log every packet that is transmitted.
Your nonprofit organization wishes to increase the efficiency of its fundraising efforts. What sort of data...
Your nonprofit organization wishes to increase the efficiency of its fundraising efforts. What sort of data might be useful to achieve this goal? How might BI tools be used to analyze this data?
List the capability(ies) profile needed for a typical business position in an organization of your choice.
List the capability(ies) profile needed for a typical business position in an organization of your choice.
Explain what a functional organization is in relation to a horizontal organizational structure and provide its...
Explain what a functional organization is in relation to a horizontal organizational structure and provide its advantages and disadvantages. Explain what a divisional organization is in relation to horizontal structures and provide the advantages and disadvantages of using a divisional organization
Discuss the potential security challenge in your life or your organization, despite that the highlight of...
Discuss the potential security challenge in your life or your organization, despite that the highlight of the security policies shall be archive in the development of the organization's security policies and keys of the security concept important to any security fundamentals.
What is the capital asset pricing model (CAPM)? What is its relation to the security market...
What is the capital asset pricing model (CAPM)? What is its relation to the security market line (SML)?
JJ Company has hired a consultant to propose a way to increase the company’s revenues. The...
JJ Company has hired a consultant to propose a way to increase the company’s revenues. The consultant has evaluated two mutually exclusive projects with the following information provided for each project: Project Turtle Project Snake Capital investment $790,000 $440,000 Annual cash flows 130,000 75,000 Estimated useful life 10 years 10 years JJ Company uses a discount rate of 9% to evaluate both projects. Instructions 1. Calculate the net present value of both projects. 2. Calculate the profitability index for each...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT