Technology

Order Instructions/Description
1. The advantages of having your own mail server *

Below is an excerpt from an article written by an IT consultant.

Running your own mail server must cost more. You have to buy hardware, mail server software, and you have to maintain it. On the other hand, it is a very good idea. Here are some of the reasons why.

Mail gets to you faster
Faster internal mail
No waiting to add new users
Easy to create aliases and lists
Full control of anti-virus and anti-spam programs
Better privacy
You are in control
Question: List and then fully discuss five (5) reasons from a cybersecurity perspective why you support or why you are against the use of a private email server. Remember to be fact- and referenced based in your answers.

Each of the five reasons must be at least 200 words long or receive no credit. (No political views should be expressed here. Submissions with political views may receive a 20% deduction.)

  1. Apple’s iPhone data encryption that makes NSA and law enforcement agencies worry about whether they can still break into phones during an investigation, even with a court order.

iPhone 6 encrypts emails, photos and contacts based on a complex mathematical algorithm that uses a code created by, and unique to, the phone’s user. Breaking the code, could take more than 5 1/2 years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers. [Excerpt]

David E. Sanger and Brian X. Chen. (Sep. 26, 2014) Signaling Post-Snowden Era, New iPhone Locks Out N.S.A. The NY Times. Retrieved from http://nyti.ms/YmQz0l

Question a. Read the full article, conduct research on the subject and fully discuss the technologies behind the new iPhone encryption. (2 pts)

Question b. State and fully discuss your opinion (support or against) about the adoption of the iPhone encryption. (2 pts)

Question c. Following Apple, Google will have its Android operating system with encryption set by default. But as we know Google can still collect your data from Gmail. So do other free email services like Yahoo and Hotmail.

Suppose you have a full-time job in cybersecurity. If there is an email service charging $40 a year but does not collect your data, are you willing to switch to this email service or would you rather stay in the current free email services by scarifying your privacy? (2 pts)

Question d. This question is hidden/encrypted in the attached picture named img.jpg (the file can be downloaded here). You need to decrypt this picture to get the question (in text.txt file).   (4 pts)
Hint: To decrypt the picture, you need to access the virtual lab and use the same tool as you have used in week 6. This time, you need to save the picture, copy this image file (img.jpg) to the c:encrypt folder to replace the original file already there on the virtual machine. Run the encrypt.exe you will see a text file comes out. The newly generated/decrypted text file is the question. (It is perfectly fine to use other methods to retrieve the text.)
Instructions on how to upload files from local computers to the VM can be found under Content -> Virtual Lab Assess ->… -> “Tips on connecting local resources to your instance of the VM”
Need help? Contact the CLAB 689 LAs or your professor.