How to configure spamassassin by means of the system

Assignment Help Computer Network Security
Reference no: EM133542804

Securing Networks

Question 1

Install and Configure Spam Assassin

This question is concerned with the installation, configuration, and testing of S- pam Assassin, which is an open source software package for filtering (removing, or flagging) SPAM (unwanted email).

The home page for Spamassassin and a useful collection of web pages providing information about Spa- massassin is available at SPAMASSASSIN. It is best to ignore any information which advises how to configure Spamassassin by means of the system known as cPanel because installation of that system is not required, or desirable, in this context.

Note: Spam Assassin is normally applied to all the incoming email at a server, but this exercise will not be conducted on an email server, but rather on a stan- dalone host. Spam Assassin can be installed in this situation, but it will be applied to an email provided as a file, by using the fi lter (a program which accepts in- put, from stdin, modifies i t, and prints the result to stdout) used by the Spam Assassin system, rather than using Spam Assassin for all the incoming email.

This question is divided into three sub questions:

2382_simple email message.jpg

Figure 1: The full text of a simple email message

(a) Use apt (a command-line tool provided in debian Linux (like ubuntu) and its variants) or synaptic (a graphic tool provided in Debian Linux and its variants) to install Spamassassin on your VM.

(b) By adding a whitelisting rule for [email protected] and a blacklisting rule for [email protected], configure Spam Assassin to allow all e- mail from [email protected] and to block all email from [email protected].

(c) Test, by using the spamassassin filter (a command), that Spam Assassin is now reporting all emails from [email protected] as spam, and all email from [email protected] is reported as ham (not spam). Include in your assignment the results of these tests which show that Spam Assassin is working correctly.

To carry out the tests, you will need an email message from [email protected] and also one from [email protected]. It is not difficult to generate such an email (by sending yourself an email message and changing the email of the sender). In addition, a sample email address is shown in Figure1.

Question 2
This question continues from where Tutorial 8 finished. Starting with the net- work shown in Figure2which has a firewall prevents communication from the

205_network with a ?rewall.jpg

 

Figure 2: A network with a firewall

Internet to all nodes in the domain except Node Web at ports 80 and 443..

Your tasks in this exercise are as follows:

(a) Add rules to the firewall which enable nodes at A and H to communicate with port 80 on nodes Y.

(b) Add rules to the firewall which enable nodes at A and H to communicate with port 80 on nodes Z.

(c) Add a new stream together with a test to show that traffic between nodes in the intranet (Domain) and the Internet except the traffic explicitly allowed in the preceding rules is blocked.

(d) Add a new steam and a test to show that traffic within the Intranet is allowed.

(e) Add a new stream and a test to show that traffic to or from any port other than 80 or 443 from node Web is blocked.

Reference no: EM133542804

Questions Cloud

What details in the dream confirm his viewpoint : What details in the dream confirm his viewpoint? What details in the knight's narrative suggest that he may have misinterpreted the situation?
Essay on the short story the tell-tale heart : In a couple paragraph mini argumentative essay on the short story "The Tell-Tale Heart," by Edgar Allan Poe, what are your thoughts about the story?
Describe how the princess will react : Describe how the princess will react? Describe how the lover will react? Describe how the damsel will react? Describe how the king will react?
Discuss the influence of digital technologies on work : Is technology a transforming solution to problems or a volatile disruption to work, organizational culture, and performance? Support your view.
How to configure spamassassin by means of the system : CSC8520 Securing Networks, University of Southern Queensland - show that traffic between nodes in the intranet (Domain) and the Internet except the traffic
Identify the position you are interested in : Identify the position you're interested in. Add what you would contribute to the organization. Express appreciation for the reader's time.
Characteristics of creative non-fiction : Please refer to specific characteristics of creative non-fiction that you found in the text as well as direct quotes and lines from the reading.
Emphasis on conceptions of origins or essences : Play in the Discourse of the Human Sciences," Derrida lays out a robust critique of structuralism's emphasis on conceptions of "origins" or "essences,".
Describes what you have learned about migration in region : Describes what you have learned about migration in this region, how it has become a problem for the people of these regions, and any possible solutions.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd