Join Lisa Bock for an in-depth discussion in this video Using Sender Policy Framework (SPF) records, part of IT Security Foundations: Operating System Security (2015).
- [Voiceoer] Email communication is vital for businesses.…However, a large percentage of email…that comes into an organization is abusive,…and that includes junk mail and spam.…And it is not appropriate for business.…Nearly all abusive email has a fake sender address.…Now, forging a sender address is done to simply…conceal a sender's true address.…Because being anonymous is key to effectively…impersonating, either a well known or trusted identity…in order to obtain passwords or personal data.…
Forging email addresses occur when email is sent via…malware, including viruses and worms,…spammers, and phishing and spear phishing attacks.…The result of bogus email delivery, ranges from…a victim divulging sensitive information,…or simply someone wasting their time…deleting bogus messages.…Reputation based systems like Spamhaus or SpamCop…monitor and blacklist IP addresses, and have worked.…
As reputation is a strong method of assuring appropriate…email traffic and preventing abusive email,…such as spam and junk mail.…
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Apply security principles to create a strong password.
- Define RADIUS.
- Describe how permissions work.
- Review how to save and secure audit files.
- Explain hardening, updates, and patches.
- Identify ways to protect the email server.