Kindly see attachment for detailsDetails: 
Using the course text, professional journal articles, or other reputable resources, and complete the assignment as listed below.

First Part:
What is the main attraction of free email (other than cost)? What are the risks associated with free email services? Think back to basic cybersecurity principles.

Second Part (in the same document):
Describe a recent, successful phishing attack. Was the email a free service? What was the organization and industry sector (healthcare, gov, etc.)? How many records were breached?

Paper Requirements:
Format: Microsoft Word

Font: Arial, 12-Point, Double-Space (or equivalent) 

Citation Style: APA or MLA (The point is to use a style that makes your document readable and give credit to the sources you used.)

Length Requirements: 
2–3 pages
Coversheet
List of References Page.
Proofread – Edit for spelling, grammar, punctuation, etc.
Use only course text, professional journal articles, or other reputable resources.Chapter 14
Internet Services and Email

Chapter 14 Overview
Fundamentals of internet service, notably email
Email formatting and transmission
Email security issues
Enterprise firewalling and point of presence

Internet Services
Software that provides Layer 7 services
Not all Layer 7 services are end-user services
DNS – name translation for other services
DHCP – automated host configuration
Traditional internet applications
Many Internet applications were developed before security problems became serious
Some date to the 1970s
Older applications: file transfer (FTP), remote terminals (Telnet), finger protocol

Internet Email
Email with “@” address dates back to 1971
Developed for ARPANET hosts
Two types of Internet standards for email
Formatting standards – layout of email messages and how to handle attachments
Protocol standards – how to exchange an email message/file between hosts

Basic Email Format

MIME Formatting
“Multipurpose Internet Message Extension”
Traditional email contains 7-bit ASCII characters
Some email servers erase the eighth bit, or otherwise modify it
MIME provides a way to embed non-ASCII encoding in an email message
Embeds images or complex documents
Formats messages using Web-style markup
Includes encrypted data or digital signatures

Email Protocols
Two Types of Protocols
Mailbox protocols – let a client program retrieve email from a server
POP3 – a simple and popular protocol
IMAP – a more elaborate protocol
MAPI – Microsoft’s Message API (Exchange)
Delivery protocols – transmit an email to another server for delivery to its destination
Typically Simple Mail Transfer Protocol: SMTP

Tracking an Email: Servers

Tracking an Email: Headers

Is This Email Genuine?

Headers from the Suspect Email

Email Security Problems
Connection-based attacks
Large-scale sniffing risks
Many sites use SSL to encrypt email traffic
Spam
Unsolicited email; often distributes frauds
Phishing
Email that tries to retrieve authentication data
Email viruses
Messages that trick user into replicating them

Spam, Spam, Spam, Spam, Spam
A huge problem
Unsolicited email wastes bandwidth, server storage space, server compute cycles
Typical spam involves fraudulent or illegal activities, or products not accepted in normal advertising channels
Frauds
Advance fee fraud
Dubious stock investments

Spam Prevention and Control
Restrict access to mail servers
Whitelists – lists of email servers that actively avoid handling spam
Blacklists – email servers that carry spam
Identify spam by pattern and filter it out
Binary matching – looks for an exact match with specific features
Statistical matching – calculates likelihood that an email is spam; filters on relative scores

Phishing
A social engineering attack
Email induces the recipient to visit a bogus website and provide login credentials
Bogus banking site, ecommerce site, email site, etc.
Elements of a phishing attack
Spam email that takes users to the bogus site
Website that




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.