Question

In: Computer Science

A consultant has recommended your organization look to increase its security profile in relation to SMTP...

A consultant has recommended your organization look to increase its security profile in relation

to SMTP traffic. Management has asked you devise a firewall-specific strategy to address the

recommendation. What strategy would you recommend, and why?

Your answer should be approximately 200-250 words in length.

Please use your own words. Do not copy and paste from other Chegg answers or the internet.

Solutions

Expert Solution

Solution : How SMTP can be secured is since the SMTP standard sends email without utilizing encryption or verification, each message you send is presented to see. Customer side arrangements, for example, Secure MIME (S/MIME) or very great protection (PGP) can tackle this issue, yet they require your clients' association. Microsoft Exchange Server offers a few apparatuses for making sure about email traffic. One approach to make sure about SMTP is to require the utilization of Secure Sockets Layer (SSL) for SMTP connections.By default, all SMTP workers utilize port 25. However, on the off chance that you use SSL on port 25, non-SSL workers won't have the option to interface through that port. What's more, in the event that you utilize a nonstandard port number, different workers won't have the option to discover your workers.

Strategy

Usage of Proxy based firewalls

These firewalls go about as a door between end clients who demand information and the wellspring of that information. Host gadgets associate with the proxy, and the proxy makes a different association with the wellspring of the information. Accordingly, source gadgets make associations with the proxy, and the proxy make a different association with the host gadget. Before giving bundles to an objective location, the intermediary can channel them to uphold arrangements and veil the area of the beneficiary's gadget, yet in addition to ensure the beneficiary's gadget and organization.


Related Solutions

A consultant has recommended your organization look to increase its security profile in relation to SMTP...
A consultant has recommended your organization look to increase its security profile in relation to SMTP traffic. Management has asked you devise a firewall-specific strategy to address the recommendation. What strategy would you recommend, and why? Your answer should be approximately 200-250 words in length Use your own words. Please do not copy and paste or use an answer already posted on Chegg
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift? could u recalculate using 1 probability i think the probability is p(4 breaches tom | 2...
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift?
As you increase the security of your network, you are concerned that the added security measures...
As you increase the security of your network, you are concerned that the added security measures may impact in ways you had not intended. For example, how could a firewall have a negative impact on business from the following list? Explain It can filter packets from a site known to cause DoS attacks. It can filter packets that have a virus signature. It can block traffic that should be allowed through. It can log every packet that is transmitted.
Your nonprofit organization wishes to increase the efficiency of its fundraising efforts. What sort of data...
Your nonprofit organization wishes to increase the efficiency of its fundraising efforts. What sort of data might be useful to achieve this goal? How might BI tools be used to analyze this data?
List the capability(ies) profile needed for a typical business position in an organization of your choice.
List the capability(ies) profile needed for a typical business position in an organization of your choice.
Explain what a functional organization is in relation to a horizontal organizational structure and provide its...
Explain what a functional organization is in relation to a horizontal organizational structure and provide its advantages and disadvantages. Explain what a divisional organization is in relation to horizontal structures and provide the advantages and disadvantages of using a divisional organization
Discuss the potential security challenge in your life or your organization, despite that the highlight of...
Discuss the potential security challenge in your life or your organization, despite that the highlight of the security policies shall be archive in the development of the organization's security policies and keys of the security concept important to any security fundamentals.
What is the capital asset pricing model (CAPM)? What is its relation to the security market...
What is the capital asset pricing model (CAPM)? What is its relation to the security market line (SML)?
JJ Company has hired a consultant to propose a way to increase the company’s revenues. The...
JJ Company has hired a consultant to propose a way to increase the company’s revenues. The consultant has evaluated two mutually exclusive projects with the following information provided for each project: Project Turtle Project Snake Capital investment $790,000 $440,000 Annual cash flows 130,000 75,000 Estimated useful life 10 years 10 years JJ Company uses a discount rate of 9% to evaluate both projects. Instructions 1. Calculate the net present value of both projects. 2. Calculate the profitability index for each...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT