Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Respond to the Text Lab Project 16.2 (Objectives 1 and 2) Provide a short narrat

ID: 3718936 • Letter: R

Question

Respond to the Text Lab Project 16.2 (Objectives 1 and 2)

Provide a short narrative on security techniques and mechanisms in protecting against spam activity.

Lab project 16.2

Find at least ten pieces of spam mail from any account, whether it be home, work, school, or something else. Using the e-mail headers, and wed site that might provide information, attempt to trace the spam mail back to its original source.

1. Collect the e-mail and view the e-mail header information in your e-mail program.

2. Find the 'received' field in the headers and write down as many DNS or IP addresses as you can. Also look for common details in the header element of the header element of the different messages such as the same e-mail service and spammers.

Explanation / Answer

Solution :-

Security techniques and mechanisms in protecting against spam activity -

The spam emails are a risk to the sensitive data and information. These type of emails are the first step of the sapm attacks. If a person reply these types of mails or clicks on the provided links then the spammer can be able to attack the security or perform the malicioius activities with the email account. Therefore, an efficient security mechnism is required to handle these spam mails or to prevent from the spam attacks.

Some security techniques are used by the organisations are described below.

1. Monitor and control the spam - It is very important to identify the spam messsages and categorize them. There are some filters in the email servers that identify the spam and mark them as spam mails. Then the user cantake the appropriate action. By using these filters the user can identify and control the spam activities in the emails.

2. The external services - The oreganizations are uses the external services to identify the spam. These external services are not inbuilt filter but eternally working services that are specialized to identify the latest spam activities and mark them as spam. So the organization can take the proper actions.

3. Fierwalls - Firewalls also can help in the preventing of the spam attacks. It helps to stop the malicious content on the outside of the system and not allow to ente them.

4. Training - Organizations shuld train their personnels about the spam activities. The employees of the organization should have the knowlwdge that how to identify the spam emails and how torespond them. These steps can enhance the security of the organization and prevents the spam activities.

Project 16.2

1. The spam emails and header of some emails are collected and given below.

A)

B)

2. The IP address gievn in the emails header are given below that can be used to trace the sender of the sapm mails.

A) 172.231.140.58

B) 26.55.242.98

Message ID <85416230@mail.soclic.in> Created on: 28 October 2015 at 12:47 (Delivered after 536 seconds) From: ezeego1 <admin@soclic.in> To: Subject: Make way for a Thailand vacay! SPF: PASS with IP 172.231.140.58 DKIM: 'PASS' with domain soclic.in
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote