Research Paper on "Computer Networks Network Security"

Research Paper 6 pages (1910 words) Sources: 0

[EXCERPT] . . . .

Concealing Email Senders

As the Internet and computer technical revolution of the last two to three decades has unfolded, the depth and breadth in which people obscure the source of emails has grown and grown. Some may paint with a broad brush and presume that obfuscation of an email's sender is always pernicious and unethical. While this can be true, it is not true across the board and there are situations where such concealment is a good idea (if not standard industry procedure). This report will cover the good and the bad.

DoNotReply Addresses

Many businesses use "donotreply" addresses as the "return" address for many emails (usually automated ones) so as to keep a clear demarcation between the automated email addresses and system and the email addresses that are monitored. For example, if Amazon's main customer service mail is -- , one can bet that will NOT be the return address on their marketing and other emails (e.g. order feedback, tracking info, etc.). If it were, that email box would be flooded with a lot of crap. Indeed, Amazon relies much more heavily on web forms on their website as opposed to the straight email route and this process serves them well. An alternate method is a strict disclaimer in the email that says that any replies directly to the email will not read or otherwise replied to. The problem with that method is that some people don't read that print on the email. As such, it's common for retailers, other businesses and colleges to take a blended approach to address both fronts.

BCC/Reply All Neutering

A story hit the news cycle within the last few weeks of a listserv being configur
Continue scrolling to

download full paper
ed improperly thus allowing people to hit "Reply All" and thus emailing EVERYONE that had received the email. The term assigned to thus buffoonery was "Reply-acolypse." Since the institution in question was a college, there was predictably a lot of pointless and mundane emails that people kept lobbing back and forth. In that case, concealing where the email came from (at least the direct address) and/or intentionally hiding the email address of other recipients (through blind carbon copying) would be a good idea. The main reason for this is not because it's an ethical compulsion but because some computer users just have no common sense (or decency sometimes) and one sometimes just has to protect people from themselves so that a few bad apples do not cause the entire system to run amok. It is akin to employers shutting down access to YouTube and Facebook. Some people may only check their social media and video streaming sites on their lunch break, but the huge hits that ensue to overall internet/data bandwidth availability and productivity take a huge hit if the carrot is not yanked away, so to speak.

Anonymous Emails & Pseudonyms

There are a number of different reasons why emails are sent without the true name of the sender and many are legitimate. For example, someone that creates a dummy account on Yahoo to report a crime or a unethical act to a business owner is not really doing anything wrong. Similarly (but much more unethical) are men or women that use fake names/emails to engage in illicit behavior online. As long as everyone is consenting and no one is being hurt, that's not a big deal either, at least from a legal perspective.

What is entirely different are phishing attacks (next section) or any other emails that utilize social engineering or other methods to gain information to which the requestor is not (and should not) be entitled to. For example, a vicious ex-husband could put his ex-wife in the hospital and could send an email posing as the sister of the victim to find out where the ex-wife is. Any hospital that releases the information about where a domestic assault victim is (or is not) is clearly out of their mind and devoid of common sense. However, it does work and it's very easy to do either from an ISP or from an Internet email service like Yahoo or Gmail.

Phishing Attacks

If there is one archetypical example of email sender concealment that is never kosher or acceptable, it is phishing attacks. These attacks take on a number of different forms. The two main ones would be a message (in and of itself) that lures someone to order something or check out a video. The links and attachments on these emails are often tied to very nefarious pieces of information including malware (e.g. key-loggers, etc.) and viruses that can cripple, or just annoy, the computer user who is foolish enough to click on the links or attachments.

The other major form of phishing email are emails that are made to look identical to those emails of sites like PayPal, Amazon, or other heavily used sites. Other common targets are banks like Bank of America, Chase Bank and so on. Many of these institutions go out of their way to say that when they send a warning or message, that people should manually navigate to the site to address it and that they should never do so from the email itself. This is good practice. Many internet browsers nowadays will scream out a warning if a site is not legitimate, but some do slip through the cracks. As such, it is always wise for these retailers and other businesses to be vigilant and to encourage their customers to do the same. Any process or procedure that can implicitly encourage someone to be ensnared in a trap (e.g. clicking on the link in an email rather than manual site navigating) should be avoided like the plague.

Business Models

Because of all the forms and iterations that email sender concealment can take on, businesses need to put their foot down and define what is acceptable, what is not, what is required, what is optional and so forth. For example, businesses should generally not permit people to use pseudonyms. A lone exception would be an email address saying "Customer Service" instead of a person's name so that there is no confusion when multiple people get involved in the same issue on that same address. There should be no instances where "Bob Smith" is using the name "John Thomas" intentionally as a means to obscure identity because there is generally no need for such skullduggery.

Internet service providers and other information service businesses that have email as part of their offerings and frameworks have their own burdens. If an ISP, for example, notes that a paying customer is using their ISP as a spam node and it's clear the emails are being sent under no names or fake names and/or the motive is to phish or otherwise steal from people, that person needs to be shut down immediately. ISP's that see this stuff going on and do nothing are complicit. It should never be about money when it involves these miscreants, it's about protecting other users and preventing negative impacts to well-behaved customers.

One tool that ISP's and network administrators can have in their arsenal is sender validation. These system tools and techniques allow the veracity and authenticity of an email to be verified as it comes from its actual source. If there is something amiss with the header or any other characteristic of the email, it can either be flagged as spam and a warning issued to the recipient or the email can be blocked so that it is not delivered. If trust of the end-users is a concern, the latter is probably the best way to go. However, this tactic and broader email filtering methods need to be used with caution because they can end up ensnaring and blocking emails that are entirely legitimate.

For the purposes of this report, unless the system (or a sharp-eyed network admin) notices something amiss about an email (its contents, its links, its attachments, or its header), the email should probably be allowed through. Obfuscation of the sending party should not be automatic grounds for blocking but it is absolutely a huge red flag. When speaking of business operations, concealing the sender of an email should never really be happening unless there is a systemic or behavioral need for it. A wide array of separate tools as well as features built into email server software suites like Microsoft Exchange can be used to prevent malfeasance but the person wielding these tools needs to do so in an informed day.

Network Ramifications

There are great implications to network engineers and internet service providers when discussing emails with concealed senders. The main dimensions that have to be looked at are phishing/identity theft situations, harassment (especially via anonymous means) or anything else that is a drag to the network. For example, even if a "spammer" runs a legal and legitimate business, they can be a huge drag to their nearby neighbors and to the ISP/network provider itself if that person weighs down the network the sheer amount… READ MORE

Quoted Instructions for "Computer Networks Network Security" Assignment:

This is not a general paper. Someone with knowledge of computer networks and network security should take it up... Please let me know which topic you will decide to work on and a brief outline just so i can check with my instructor if it is fine.... I dont want you writing a paper on a topic which he doesnt accept ...

Here are the instructions:

The paper should be ~7-8 pages or so. I have two general topic areas to suggest. You can pick one...

Network security

Here are some sample topics to write about

* buffer overflow vulnerabilities

* spambot networks

* concealing email senders

* virus propagation

* web-browser vulnerabilities & malicious websites

* cross-site scripting attacks

* others (but check with me first)

* Loyola-scale firewalls, and how to probe and validate them

The mostly social-engineering issues, like phishing attacks, are only incidentally network related, and I*****'d prefer that networking issues receive more attention.

Backbone routing

Your paper should address some *technical* issues that medium-to-large-scale ISPs must address. Here are some options:

* cisco router configuration

* BGP configuration, and interaction with a site*****'s internal routers

* provider business models

How to Reference "Computer Networks Network Security" Research Paper in a Bibliography

Computer Networks Network Security.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/concealing-email-senders/1286460. Accessed 3 Jul 2024.

Computer Networks Network Security (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/concealing-email-senders/1286460
A1-TermPaper.com. (2012). Computer Networks Network Security. [online] Available at: https://www.a1-termpaper.com/topics/essay/concealing-email-senders/1286460 [Accessed 3 Jul, 2024].
”Computer Networks Network Security” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/concealing-email-senders/1286460.
”Computer Networks Network Security” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/concealing-email-senders/1286460.
[1] ”Computer Networks Network Security”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/concealing-email-senders/1286460. [Accessed: 3-Jul-2024].
1. Computer Networks Network Security [Internet]. A1-TermPaper.com. 2012 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/concealing-email-senders/1286460
1. Computer Networks Network Security. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/concealing-email-senders/1286460. Published 2012. Accessed July 3, 2024.

Related Research Papers:

Protecting a Network From Intrusion and Data Loss Research Paper

Paper Icon

Computer Network Security Issues

Computer technology has changed society tremendously in the last two decades. Today, virtually every aspect of modern business depends on computer systems and computer networks, including… read more

Research Paper 6 pages (1894 words) Sources: 12 Topic: Computers / IT / Internet


Net Mon Overview Network Security Monitoring: Course Term Paper

Paper Icon

Net Mon Overview

Network Security Monitoring: Course Overview and Reflections

The term "network security monitoring" can sound daunting and dry even to someone that is already somewhat aware of the… read more

Term Paper 5 pages (1463 words) Sources: 3 Topic: Computers / IT / Internet


Network Security Term Paper

Paper Icon

Network Security

The practice of networking has reached new heights in both homes and the office environment. Networking solutions are often chosen because of the convenience that they provide.

Although… read more

Term Paper 5 pages (1551 words) Sources: 8 Style: APA Topic: Computers / IT / Internet


Computer Network Security -- Information Assurance Issues Essay

Paper Icon

Computer Network Security -- Information Assurance Issues

Discussion Question 1 - Information Assurance and IA-CMM.

In general, information assurance relates to the three "CIA" elements of information confidentiality, integrity, and… read more

Essay 2 pages (588 words) Sources: 2 Topic: Management / Organizations


Network Plan for ABC Corporation Essay

Paper Icon

Network Plan for ABC Corp

Scenario

ABC Corporation has just recently installed new routers onto the network and intends to design the appropriate network security to prevent the malicious and… read more

Essay 9 pages (2595 words) Sources: 8 Topic: Computers / IT / Internet


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!