+1-415-670-9189
info@expertsmind.com
A comprehensive study about web-based email implementation
Course:- Computer Network Security
Length: 8
Reference No.:- EM13205




Assignment Help
Assignment Help >> Computer Network Security

A. Review full headers of a sample email message you received in your gmail account (create one if you don't have one already): starting upward from the line right on top of the email message body, identify all components, from the sender's info, hop-by-hop, to your inbox (the destination);

B. Outline the process when you enter an URL in your web browser to connect to gmail, which including but not limited to, how DNS works in the background to get you to the destination; how the HTTP url is directed to HTTPs prior to authentication taking place; how the 3-way handshake process played out in this case; OPTIONAL: roles of digit certificate(s) & cookies; security and privacy issues involved;

C. What happened immediately in the background after you enter your credentials; what info is encrypted; OPTIONAL: what authentication mechanism is behind gmail's sign-in process;

D. Based upon your understanding of the responsibilities of each layer in OSI model, give a high level description about, in the above received sample email message, what happened at both the sender and you as recipient ends, from layer to layer.

E. Roles of SMTP, IMAP, FTP(s), MIME, ENCODING or other technologies involved in composing, sending and receiving an email message, uploading or downloading an attachment; OPTIONAL: how a! ntivirus works prior to downloading your attachment;

A project report to present your findings, including support evidences (such as highlighted contents of packets captured, screen shots, diagrams and charts); along with plain English description; summarize with some conclusions in answering the above questions accordingly.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers us
Conclude the main reasons why the attack on Target occurred. Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of
Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals, mod n, and signing that?
You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find
Create three to five screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the requ
Using the Web, research the debate over ActiveX controls and analyze Microsoft's security design. Is it strong enough? What security breaches have occurred in the past reg
IPv6 uses addresses that are 16 bytes long (128 bits ).  How many addresses is that per person in the world? and What classes does Java provide to make network programming eas
Overview: For this milestone, you will prepare an initial security planning report. This document will become the foundation for the final risk assessment and mitigation str