This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

 Network Security

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 Network Security

  • 8.1

-The designated internet standard for electronic mail transmission is the Simple Mail Transfer Protocol.

RFC 5321 is included in the SMTP and refers to the protocol that is used in the present day while RFC 5322 refers to a format that is designed for text messages that are transmitted via electronic mail.

 

  • 8.2

The Simple Mail Transfer Protocol is the standard protocol in the TCP/IP protocol suite that transfers mail between hosts while the Multipurpose Internet Mail Extension refers to an extension of the SMTP that overcomes its limitation and solves particular problems.

  • 8.3?

MIME-Version, Content-Type, and Content-Transfer-Encoding are headers that determine the nature of the rest of the email message. For the email to be properly rendered in the email client, the client must understand how to render an image or HTML document.

MIME and content type are two different things. MIME is a set of standards that was written to extend the capabilities of email messages and is widely distributed and incorporated into the internet content and HTTP while the Content-type is a header used both in email messages and HTTP. Practically, however, content type and MIME type are used interchangeably.

 

  • 8.4

-This refers to the encoding system that is designed to be deployed by binary data standardevery group of 3 octets of binary data is mapped to a 4 ASCII character.

  • 8.5

Radix-64 conversion is used as the encoding procedure for PGP and S/MIME. This procedure maps arbitrary binary input into printable character output. No control characters are included in the set. Thus, a message encoded in radix 64 can traverse mail-handling systems that scan the data stream for control characters (Mula & Lemire, 2018). Mail is transferred from a storage device in the sending host to a storage device in the receiving host.

It may be necessary to perform certain transformations on the mail because data storage representations in the two systems are different.

For the sake of simplicity, all data must be represented in MTP as NVT-ASCII. This means that characters must be converted into the standard NVT-ASCII representation when transmitting text, regardless of whether the sending and receiving hosts are dissimilar. The sender converts the data from its internal character representation to the standard 8-bit NVT-ASCII representation. The receiver converts the data from the standard form to its internal form. According to this standard, the sequence should be used to denote the end of a line of text.

 

  • 8.6
  • Secure/Multipurpose Internet Mail Extension refers to a security improvement to the MIME Internet e-mail format standard following directives from the RSA data security.
  • 8.7
  1. Authentication
  2. Message Integrity.
  3. Non-repudiation of origin utilizing a digital signature
  4. Message Privacy
  • 8.8

-This signature is sent independently of the message. This occurs when the client wants to keep a separate log for all the prior signatures that are used.  The detached signature of an executable program can detect virus infections. It is compulsory when a document has to be digitally signed and requires the signature of more than one user.

  • 8.9

-Domain Key Identified Mail is required for cryptographically signing of e-mail messages, effectively allowing the domain responsible for signing to be held accountable for a message in the mail stream. The message recipient has to authenticate the signature through querying the signer’s domain and retrieving the appropriate public key and therefore confirming the message was attested by a party that has the private key for the signing domain (Sachtjen & Tir, 2018).

 

 

 

 

 

 

 

 

References

Muła, W., & Lemire, D. (2018). Faster Base64 encoding and decoding using AVX2 instructions. ACM Transactions on the Web (TWEB)12(3), 1-26.

Sachtjen, S. A., Hociota, V. A., Lazar, R. V., & Tir, S. A. (2018). U.S. Patent Application No. 13/231,795.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask