SlideShare a Scribd company logo
Chapter 14
Internet Services and Email
Chapter 14 Overview
Fundamentals of internet service, notably email
Email formatting and transmission
Email security issues
Enterprise firewalling and point of presence
Internet Services
Software that provides Layer 7 services
Not all Layer 7 services are end-user services
DNS – name translation for other services
DHCP – automated host configuration
Traditional internet applications
Many Internet applications were developed before security
problems became serious
Some date to the 1970s
Older applications: file transfer (FTP), remote terminals
(Telnet), finger protocol
Internet Email
Email with “@” address dates back to 1971
Developed for ARPANET hosts
Two types of Internet standards for email
Formatting standards – layout of email messages and how to
handle attachments
Protocol standards – how to exchange an email message/file
between hosts
Basic Email Format
MIME Formatting
“Multipurpose Internet Message Extension”
Traditional email contains 7-bit ASCII characters
Some email servers erase the eighth bit, or otherwise modify it
MIME provides a way to embed non-ASCII encoding in an
email message
Embeds images or complex documents
Formats messages using Web-style markup
Includes encrypted data or digital signatures
Email Protocols
Two Types of Protocols
Mailbox protocols – let a client program retrieve email from a
server
POP3 – a simple and popular protocol
IMAP – a more elaborate protocol
MAPI – Microsoft's Message API (Exchange)
Delivery protocols – transmit an email to another server for
delivery to its destination
Typically Simple Mail Transfer Protocol: SMTP
Tracking an Email: Servers
Tracking an Email: Headers
Is This Email Genuine?
Headers from the Suspect Email
Email Security Problems
Connection-based attacks
Large-scale sniffing risks
Many sites use SSL to encrypt email traffic
Spam
Unsolicited email; often distributes frauds
Phishing
Email that tries to retrieve authentication data
Email viruses
Messages that trick user into replicating them
Spam, Spam, Spam, Spam, Spam
A huge problem
Unsolicited email wastes bandwidth, server storage space,
server compute cycles
Typical spam involves fraudulent or illegal activities, or
products not accepted in normal advertising channels
Frauds
Advance fee fraud
Dubious stock investments
Spam Prevention and Control
Restrict access to mail servers
Whitelists – lists of email servers that actively avoid handling
spam
Blacklists – email servers that carry spam
Identify spam by pattern and filter it out
Binary matching – looks for an exact match with specific
features
Statistical matching – calculates likelihood that an email is
spam; filters on relative scores
Phishing
A social engineering attack
Email induces the recipient to visit a bogus website and provide
login credentials
Bogus banking site, ecommerce site, email site, etc.
Elements of a phishing attack
Spam email that takes users to the bogus site
Website that collects user's credentials
Domain name that carries the website
Email Viruses
Contains an executable attachment that propagates the virus if
the user runs it
The virus typically uses the user's email client to transmit the
virus to people in the user's email contact list
Recipients may treat the email as legitimate since it comes from
an acquaintance
Examples: Melissa, ILOVEYOU, Resume
Mechanisms: Microsoft Visual Basic, or binary executables
masquerading as other files
Email Chain Letters
An email that induces the recipient to forward it to a lot of
other people
Some are based on traditional paper-based chain letters (illegal
under Post Office rules)
Hoaxes – if recipients forward the email, some benefit arises
(donations to a cause, etc.)
Cancer examples
Virus hoaxes – emails that warn of a computer security risk and
recommend forwarding to everyone – not how we distribute
such warnings
Enterprise Firewalls
Provide access control at a site's gateway
Originally not intended as part of Internet
Now provides NAT and traffic filtering
Internet Access Policy Issues
How do employees use the Internet to get their work done?
What services does the enterprise offer to Internet users?
Internet-Related Risks
Risks posed by Internet access
Attacks on internal file servers and clients (#1)
Poor email service due to spam (#4)
Risks posed by a lack of Internet
Lost sales from lack of a website (#2)
Lack of email yields poor customer communication (#3)
Ineffective R&D, marketing, and purchasing staff due to lack of
browser access (#5)
A Simple Internet Policy
Controlling Internet Traffic
Host control
Restrict on sending or receiving address
Service control
Restrict on TCP or UDP port number
Direction control
Restrict according to whether the traffic was initiated inside or
outside of the site
Content control
Examine application-level data to detect violations of specific
restrictions
Filtering Internet Traffic
Traffic Filtering Mechanisms
Packet filtering
Examine individual packets
Make decisions on a per-packet basis
Session filtering
Establish a session based on socket address
Permit/deny based on source of session
Keep track of session status (i.e., TCP open)
Application filtering
Reconstruct application layer data and filter based on data
contents
Firewall Rule Format
Rules to Enforce Simple Policy
Enterprise Point of Presence (POP)
POP topology – how site connects to Internet
Single firewall, with optional bastion host
Three-legged firewall
Dual firewall
The DMZ – demilitarized zone
A military/political term for an internal LAN that accepts
inbound Internet connections
May be protected from the rest or the enterprise LAN via a
firewall
Single Firewall with Bastion Host
Three-Legged Firewall
Dual Firewall with DMZ
Attacking a Firewall
Protocol attacks
IP spoofing – bypassed firewall by masquerading as internal
traffic
Fragmentation attack – made first fragment too small to contain
the port number
Tunneling
Embed traffic inside a protocol that the firewall always passes,
like Web pages
Requires custom client and server
Some legitimate vendors use tunneling
image2.jpg
image3.jpg
image4.jpg
image5.jpg
image6.jpg
image7.jpg
image8.jpg
image9.jpg
image10.jpg
image11.jpg
image12.jpg
image13.jpg
image14.jpg
image1.jpg
Details:
Using the course text, professional journal articles, or other
reputable resources, and complete the assignment as listed
below.
First Part:
What is the main attraction of free email (other than
cost)? What are the risks associated with free email services?
Think back to basic cybersecurity principles.
Second Part (in the same document):
Describe a recent, successful phishing attack. Was the
email a free service? What was the organization and industry
sector (healthcare, gov, etc.)? How many records were
breached?
Paper Requirements:Format: Microsoft Word
Font: Arial, 12-Point, Double-Space (or equivalent)
Citation Style: APA or MLA (The point is to use a style
that makes your document readable and give credit to the
sources you used.)
Length Requirements:
2–3 pages
Coversheet
List of References Page.
Proofread - Edit for spelling, grammar, punctuation, etc.
Use only course text, professional journal articles, or other
reputable resources.

More Related Content

PPTX
Modern Anti-Spam Protection - Rejection, no sorting
PPT
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
PPT
The Internet
PPTX
UNIT-I NETWORKING - II.pptx. For class iX
PPT
KVH MailScan MX
ODP
Email Security Appliance from IBM
PPT
202160902-Internet-Intranet-Extranet.ppt
PPT
Ch12(revised 20071226)
Modern Anti-Spam Protection - Rejection, no sorting
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
The Internet
UNIT-I NETWORKING - II.pptx. For class iX
KVH MailScan MX
Email Security Appliance from IBM
202160902-Internet-Intranet-Extranet.ppt
Ch12(revised 20071226)

Similar to Chapter 14Internet Services and EmailChapter 14 Overview.docx (20)

PPTX
L5_Electronic communication.pptx
PPT
Electronic Communication Investigate
PPT
Electronic Communication Investigate
PPTX
Modern Anti-Spam - Rejection, No Sorting (Version 2014)
PPT
apsec SEPPmail Email Security Gateway
PPT
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
PPT
Ironport Data Loss Prevention
PPT
E mail image spam filtering techniques
PPT
Web Application Security
PPT
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
PPT
Exp2003 Int Ppt 01
PDF
NME UNIT I & II MATERIAL.pdf
PPTX
it ppt-2.pptx
PPTX
S/MIME & E-mail Security (Network Security)
PPTX
FortiMail-Email-Secure-Gateway-May-2018_v1.pptx
PPTX
network security / information security
PPTX
Technical Background Overview Ppt
PPT
E mail systems
PPTX
presentation on email.pptx
PPTX
Email Security: The Threat Landscape
L5_Electronic communication.pptx
Electronic Communication Investigate
Electronic Communication Investigate
Modern Anti-Spam - Rejection, No Sorting (Version 2014)
apsec SEPPmail Email Security Gateway
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
Ironport Data Loss Prevention
E mail image spam filtering techniques
Web Application Security
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Exp2003 Int Ppt 01
NME UNIT I & II MATERIAL.pdf
it ppt-2.pptx
S/MIME & E-mail Security (Network Security)
FortiMail-Email-Secure-Gateway-May-2018_v1.pptx
network security / information security
Technical Background Overview Ppt
E mail systems
presentation on email.pptx
Email Security: The Threat Landscape

More from bartholomeocoombs (20)

DOCX
CompetencyAnalyze how human resource standards and practices.docx
DOCX
CompetencyAnalyze financial statements to assess performance.docx
DOCX
CompetencyAnalyze ethical and legal dilemmas that healthcare.docx
DOCX
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
DOCX
CompetencyAnalyze collaboration tools to support organizatio.docx
DOCX
Competency Checklist and Professional Development Resources .docx
DOCX
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
DOCX
Competency 2 Examine the organizational behavior within busines.docx
DOCX
CompetenciesEvaluate the challenges and benefits of employ.docx
DOCX
CompetenciesDescribe the supply chain management principle.docx
DOCX
CompetenciesABCDF1.1 Create oral, written, or visual .docx
DOCX
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docx
DOCX
Competencies and KnowledgeWhat competencies were you able to dev.docx
DOCX
Competencies and KnowledgeThis assignment has 2 parts.docx
DOCX
Competencies and KnowledgeThis assignment has 2 partsWhat.docx
DOCX
Competences, Learning Theories and MOOCsRecent Developments.docx
DOCX
Compensation  & Benefits Class 700 words with referencesA stra.docx
DOCX
Compensation, Benefits, Reward & Recognition Plan for V..docx
DOCX
Compete the following tablesTheoryKey figuresKey concepts o.docx
DOCX
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
CompetencyAnalyze how human resource standards and practices.docx
CompetencyAnalyze financial statements to assess performance.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare.docx
CompetencyAnalyze ethical and legal dilemmas that healthcare wor.docx
CompetencyAnalyze collaboration tools to support organizatio.docx
Competency Checklist and Professional Development Resources .docx
Competency 6 Enagage with Communities and Organizations (3 hrs) (1 .docx
Competency 2 Examine the organizational behavior within busines.docx
CompetenciesEvaluate the challenges and benefits of employ.docx
CompetenciesDescribe the supply chain management principle.docx
CompetenciesABCDF1.1 Create oral, written, or visual .docx
COMPETENCIES734.3.4 Healthcare Utilization and Finance.docx
Competencies and KnowledgeWhat competencies were you able to dev.docx
Competencies and KnowledgeThis assignment has 2 parts.docx
Competencies and KnowledgeThis assignment has 2 partsWhat.docx
Competences, Learning Theories and MOOCsRecent Developments.docx
Compensation  & Benefits Class 700 words with referencesA stra.docx
Compensation, Benefits, Reward & Recognition Plan for V..docx
Compete the following tablesTheoryKey figuresKey concepts o.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx

Recently uploaded (20)

PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Cell Types and Its function , kingdom of life
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Trump Administration's workforce development strategy
PDF
Complications of Minimal Access Surgery at WLH
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Lesson notes of climatology university.
Unit 4 Skeletal System.ppt.pptxopresentatiom
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
A powerpoint presentation on the Revised K-10 Science Shaping Paper
1_English_Language_Set_2.pdf probationary
Cell Types and Its function , kingdom of life
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Digestion and Absorption of Carbohydrates, Proteina and Fats
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Trump Administration's workforce development strategy
Complications of Minimal Access Surgery at WLH
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Lesson notes of climatology university.

Chapter 14Internet Services and EmailChapter 14 Overview.docx

  • 1. Chapter 14 Internet Services and Email Chapter 14 Overview Fundamentals of internet service, notably email Email formatting and transmission Email security issues Enterprise firewalling and point of presence Internet Services Software that provides Layer 7 services Not all Layer 7 services are end-user services DNS – name translation for other services DHCP – automated host configuration Traditional internet applications Many Internet applications were developed before security problems became serious Some date to the 1970s Older applications: file transfer (FTP), remote terminals (Telnet), finger protocol Internet Email Email with “@” address dates back to 1971 Developed for ARPANET hosts Two types of Internet standards for email Formatting standards – layout of email messages and how to handle attachments Protocol standards – how to exchange an email message/file between hosts
  • 2. Basic Email Format MIME Formatting “Multipurpose Internet Message Extension” Traditional email contains 7-bit ASCII characters Some email servers erase the eighth bit, or otherwise modify it MIME provides a way to embed non-ASCII encoding in an email message Embeds images or complex documents Formats messages using Web-style markup Includes encrypted data or digital signatures Email Protocols Two Types of Protocols Mailbox protocols – let a client program retrieve email from a server POP3 – a simple and popular protocol IMAP – a more elaborate protocol MAPI – Microsoft's Message API (Exchange) Delivery protocols – transmit an email to another server for delivery to its destination Typically Simple Mail Transfer Protocol: SMTP Tracking an Email: Servers Tracking an Email: Headers
  • 3. Is This Email Genuine? Headers from the Suspect Email Email Security Problems Connection-based attacks Large-scale sniffing risks Many sites use SSL to encrypt email traffic Spam Unsolicited email; often distributes frauds Phishing Email that tries to retrieve authentication data Email viruses Messages that trick user into replicating them Spam, Spam, Spam, Spam, Spam A huge problem Unsolicited email wastes bandwidth, server storage space, server compute cycles Typical spam involves fraudulent or illegal activities, or products not accepted in normal advertising channels Frauds Advance fee fraud Dubious stock investments Spam Prevention and Control Restrict access to mail servers Whitelists – lists of email servers that actively avoid handling spam Blacklists – email servers that carry spam
  • 4. Identify spam by pattern and filter it out Binary matching – looks for an exact match with specific features Statistical matching – calculates likelihood that an email is spam; filters on relative scores Phishing A social engineering attack Email induces the recipient to visit a bogus website and provide login credentials Bogus banking site, ecommerce site, email site, etc. Elements of a phishing attack Spam email that takes users to the bogus site Website that collects user's credentials Domain name that carries the website Email Viruses Contains an executable attachment that propagates the virus if the user runs it The virus typically uses the user's email client to transmit the virus to people in the user's email contact list Recipients may treat the email as legitimate since it comes from an acquaintance Examples: Melissa, ILOVEYOU, Resume Mechanisms: Microsoft Visual Basic, or binary executables masquerading as other files Email Chain Letters An email that induces the recipient to forward it to a lot of other people Some are based on traditional paper-based chain letters (illegal under Post Office rules) Hoaxes – if recipients forward the email, some benefit arises
  • 5. (donations to a cause, etc.) Cancer examples Virus hoaxes – emails that warn of a computer security risk and recommend forwarding to everyone – not how we distribute such warnings Enterprise Firewalls Provide access control at a site's gateway Originally not intended as part of Internet Now provides NAT and traffic filtering Internet Access Policy Issues How do employees use the Internet to get their work done? What services does the enterprise offer to Internet users? Internet-Related Risks Risks posed by Internet access Attacks on internal file servers and clients (#1) Poor email service due to spam (#4) Risks posed by a lack of Internet Lost sales from lack of a website (#2) Lack of email yields poor customer communication (#3) Ineffective R&D, marketing, and purchasing staff due to lack of browser access (#5) A Simple Internet Policy Controlling Internet Traffic Host control Restrict on sending or receiving address Service control Restrict on TCP or UDP port number
  • 6. Direction control Restrict according to whether the traffic was initiated inside or outside of the site Content control Examine application-level data to detect violations of specific restrictions Filtering Internet Traffic Traffic Filtering Mechanisms Packet filtering Examine individual packets Make decisions on a per-packet basis Session filtering Establish a session based on socket address Permit/deny based on source of session Keep track of session status (i.e., TCP open) Application filtering Reconstruct application layer data and filter based on data contents Firewall Rule Format Rules to Enforce Simple Policy Enterprise Point of Presence (POP) POP topology – how site connects to Internet Single firewall, with optional bastion host
  • 7. Three-legged firewall Dual firewall The DMZ – demilitarized zone A military/political term for an internal LAN that accepts inbound Internet connections May be protected from the rest or the enterprise LAN via a firewall Single Firewall with Bastion Host Three-Legged Firewall Dual Firewall with DMZ Attacking a Firewall Protocol attacks IP spoofing – bypassed firewall by masquerading as internal traffic Fragmentation attack – made first fragment too small to contain the port number Tunneling Embed traffic inside a protocol that the firewall always passes, like Web pages Requires custom client and server Some legitimate vendors use tunneling image2.jpg image3.jpg image4.jpg
  • 8. image5.jpg image6.jpg image7.jpg image8.jpg image9.jpg image10.jpg image11.jpg image12.jpg image13.jpg image14.jpg image1.jpg Details: Using the course text, professional journal articles, or other reputable resources, and complete the assignment as listed below. First Part: What is the main attraction of free email (other than cost)? What are the risks associated with free email services? Think back to basic cybersecurity principles. Second Part (in the same document): Describe a recent, successful phishing attack. Was the email a free service? What was the organization and industry sector (healthcare, gov, etc.)? How many records were breached? Paper Requirements:Format: Microsoft Word Font: Arial, 12-Point, Double-Space (or equivalent) Citation Style: APA or MLA (The point is to use a style
  • 9. that makes your document readable and give credit to the sources you used.) Length Requirements: 2–3 pages Coversheet List of References Page. Proofread - Edit for spelling, grammar, punctuation, etc. Use only course text, professional journal articles, or other reputable resources.