A comprehensive study about web-based email implementation
Course:- Computer Network Security
Length: 8
Reference No.:- EM13205

Assignment Help
Assignment Help >> Computer Network Security

A. Review full headers of a sample email message you received in your gmail account (create one if you don't have one already): starting upward from the line right on top of the email message body, identify all components, from the sender's info, hop-by-hop, to your inbox (the destination);

B. Outline the process when you enter an URL in your web browser to connect to gmail, which including but not limited to, how DNS works in the background to get you to the destination; how the HTTP url is directed to HTTPs prior to authentication taking place; how the 3-way handshake process played out in this case; OPTIONAL: roles of digit certificate(s) & cookies; security and privacy issues involved;

C. What happened immediately in the background after you enter your credentials; what info is encrypted; OPTIONAL: what authentication mechanism is behind gmail's sign-in process;

D. Based upon your understanding of the responsibilities of each layer in OSI model, give a high level description about, in the above received sample email message, what happened at both the sender and you as recipient ends, from layer to layer.

E. Roles of SMTP, IMAP, FTP(s), MIME, ENCODING or other technologies involved in composing, sending and receiving an email message, uploading or downloading an attachment; OPTIONAL: how a! ntivirus works prior to downloading your attachment;

A project report to present your findings, including support evidences (such as highlighted contents of packets captured, screen shots, diagrams and charts); along with plain English description; summarize with some conclusions in answering the above questions accordingly.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network secu
IT security personnel need to not only know what actions we need to implement, we need to understand why we need to take them and well as the any related background topics.
list one way to prevent malware from executing in Windows from directories that are not normally used for executables. What are the risks of implementing this technique?
Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (dece
Explain the key considerations behind establishing trust relationships between the two (2) domains. Suggest a method for consolidating Core Network services. Provide a plan fo
Discuss how security for a traditional information system will change when you transfer that system into the cloud. Specifically what are the security implications of using
Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function
This assignment is for students to meet parts of the following learning outcomes. Be able to critically analyse the various approaches for mitigating security risk, includin