+1-415-670-9189
info@expertsmind.com
A comprehensive study about web-based email implementation
Course:- Computer Network Security
Length: 8
Reference No.:- EM13205




Assignment Help
Assignment Help >> Computer Network Security

A. Review full headers of a sample email message you received in your gmail account (create one if you don't have one already): starting upward from the line right on top of the email message body, identify all components, from the sender's info, hop-by-hop, to your inbox (the destination);

B. Outline the process when you enter an URL in your web browser to connect to gmail, which including but not limited to, how DNS works in the background to get you to the destination; how the HTTP url is directed to HTTPs prior to authentication taking place; how the 3-way handshake process played out in this case; OPTIONAL: roles of digit certificate(s) & cookies; security and privacy issues involved;

C. What happened immediately in the background after you enter your credentials; what info is encrypted; OPTIONAL: what authentication mechanism is behind gmail's sign-in process;

D. Based upon your understanding of the responsibilities of each layer in OSI model, give a high level description about, in the above received sample email message, what happened at both the sender and you as recipient ends, from layer to layer.

E. Roles of SMTP, IMAP, FTP(s), MIME, ENCODING or other technologies involved in composing, sending and receiving an email message, uploading or downloading an attachment; OPTIONAL: how a! ntivirus works prior to downloading your attachment;

A project report to present your findings, including support evidences (such as highlighted contents of packets captured, screen shots, diagrams and charts); along with plain English description; summarize with some conclusions in answering the above questions accordingly.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Using or textbooks, internet and other resources, identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare a
MN603 Wireless Networks and Security Assignment. Research the possible ways of creating such a CCTV system for the above Case study to help Raju out. Which way would be the b
Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis
He wants to utilize a variety of electronic tablets to access and read e-mail from government web sites (Note: Coast Guard is dual-hatted -Department of Defense and Departme
Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's a
Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include. Research and discuss 3 items t
computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html
Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic inv