6480348_1825524612_2851685268668
pdf
keyboard_arrow_up
School
Multimedia University of Kenya *
*We aren’t endorsed by this school
Course
8520
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
4
Uploaded by MasterGazelle3536
Assignment
3
(
CSC8520
)
Instructions:
there are 3 questions in total for Assignment 3. Please
submit
one
single .pdf file for Assignment 3 with file names as "your student ID + your
name + a3solutions".
Question
1.
(
4
0
marks)
Install
and
Configure
Spam
Assassin
This
exercise
is
concerned
with
the
installation,
configuration,
and
testing
of
Spam
Assassin
,
which
is
an
open
source
software
package
for
filtering
(removing,
or
flagging)
SPAM
(unwanted
email).
The
home
page
for
Spamassassin
is
at
https://spamassassin.apache.
org/
and
a
useful
collection
of
web
pages
providing
information
about
Spa-
massassin
is
available
at
https://cwiki.apache.org/confluence/display/
SPAMASSASSIN/
.
It
is
best
to
ignore
any
information
which
advises
how
to
configure
Spamassassin
by
means
of
the
system
known
as
cPanel
because
installation
of
that
system
is
not
required,
or
desirable,
in
this
context.
Note:
Spam
Assassin
is
normally
applied
to
all
the
incoming
email
at
a
server,
but
this
exercise
will
not
be
conducted
on
an
email
server,
but
rather
on
a
stan-
dalone
host.
Spam
Assassin
can
be
installed
in
this
situation,
but
it
will
be
applied
to
an
email
provided
as
a
file,
by
using
the
filter
(a
program
which
accepts
in-
put,
from
stdin
,
modifies
it,
and
prints
the
result
to
stdout
)
used
by
the
Spam
Assassin
system,
rather
than
using
Spam
Assassin
for
all
the
incoming
email.
This
question
is
divided
into
three
parts,
which
are
then
repeated,
using
a
different
operating
system.
(a) Use apt (a command-line tool provided in debian Linux (like ubuntu) and its
variants)
or
synaptic
(a
graphic
tool
provided
in
Debian
Linux
and
its
variants
which was discussed during practicum in Teaching Week 7
)
to
install
Spamassassin
on
your
USQ
VM
(refer to "CSC8520 Course VM is ready" on
your Studydesk for VM connection)
.
(5 marks)
1
MIME-Version: 1.0
Date: Wed, 31 Mar 2021 13:32:44 +1000
Message-ID: <CAJRZaN-60v7Wp5kW0Sp68Rd-dH0mo1On9P7S5fCmz5s6yaticQ@mail.gmail.com>
Subject: test msg
From: Joe Bloggs <Joe.Bloggs@gmail.com>
To: Joe Bloggs <Joe.Bloggs@gmail.com>
Content-Type: text/plain; charset="UTF-8"
test message contents
--
Joe Bloggs
Figure
1:
The
full
text
of
a
simple
email
message
(b)
By
adding
a
black
listing
rule
for
hacker
@usq.edu.au
and
a
whilte
listing
rule
for
victim
@usq.edu.au
,
configure
Spam
Assassin
to
block
all
email
s
from
hacker
@usq.edu.au
and
to
allow
all
email
s
from
victim
@
usq.edu.au
.
(20 marks)
(c)
Test,
by
using
the
spamassassin
filter
(a
command),
that
Spam
Assassin
is
now
reporting
all
email
s
from
hacker
@usq.edu.au
as
spam,
and
all
email
s
from
victim
@usq.edu.au
are
reported
as
normal emails
(not
spam).
Include
in
your
assignment
the
results
of
these
tests
which
show
that
Spam
Assassin
is
working
correctly.
To carry out the tests, you will need an email
message from victim@usq.edu.au and also one from hacker@usq.edu.au. It is
not difficult to generate such an email (by sending yourself an email message
and changing the email of the sender). In addition, a sample email address is
shown in Figure 1.
(15 marks)
Notes
:
All
steps
of
the
installation,
configuration,
and
testing
of
spamassassin,
should be recorded and included in your assignment report.
All text and
screenshots should be included as figures in your submission. Please explain
each procedure carried out during your work.
2
Figure
2:
A
network
with
a
firewall
Question
2
(
5
5
marks)
This
exercise
continues
from
where
Teaching Week 8's practicum
finished.
Starting
with
t
h
e
network
shown
in
Figure
2
which
has
a
firewall
prevents
c
ommunication
from
the
Internet
to
all
nodes
in
the
domain
except
Node
Web
at
ports
80
and
44
3
.
This
network
is
available
at
https://netml.org/netml4_73/index.jsp?netname=
firewallnet&location=Repository
.
Your
tasks
!)B*!.)
e
*
in
this
exercise
are
as
follows
/!0PUFT;!
if you want to reset the network
during work, please click the link above
<!BEEJOH!B!OFX!TUSFBN!DBO!CF!EPOF!CZ!
DMJDLJOH!UIF!MBTU!BSSPX!PO!UIF!DPOUSPM!QBOFM!PG!#OFUFMFNFOU!EFUBJMT#/
(a)
Add
rules
to
the
firewall
which
enable
nodes
at
A
and
H
to
communicate
with
port
80
on
nodes
Y.
(9 marks)
(b)
(c)
(d)
(e)
Add rules to the firewall which enable nodes at A and H to communicate
with port 443 on nodes Z.
(9 marks)
Add
a new stream together with a
test
to show
that
traffic
between
nodes
in
the
intranet
(Domain)
and
the
Internet
except
the
traffic
explicitly
allowed
in
the
preceding
rules
is
blocked.
(9 marks)
Add
a new steam and
a
test
to show
that
traffic
within
the
Intranet
is
allowed
.
(9 marks)
Add a new stream and a test to show that traffic to or from any port other
than
80
or
44
3
from
node
Web
is
blocked.
(9 marks)
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question
3
(
15
marks)
In
each
of
the
following
scenarios,
write an essay (~100 words, with <=5%
(shorter or longer) tolerance allowed) on
what
options
you
have,
decide
on
a
course
of
action
and
explain
your
choice.
In
all
cases,
please
assume
that
you
are
working in a section, comprising 20 staff,
of a medium sized organization (e.g. 300 staff), and your section is responsible for
the ICT management and delivery of your organisation.
(a) You are approached by the representative of a company which sells equipment that
your company makes use of. During your conversation, the company representative
offers to provide one unit of the equipment for your individual home usage for free (i.e.,
as a gift) should you purchase 1000 units for company usage. What should you do?
(b) You are on an interview panel for a new position in your section. One of the
candidates is your cousin. What should you do?
(c) You have been involved in an activity at your child’s school until 10.00am,
and when you arrive at work, you discover that one group of staff, the engineering
section, who are responsible for product development, have been
unable to access the server that they use, for all their development work, for
the last 12 hours. You realise that, on the previous evening, you have made a
mistake in the configuration of a router which has caused the outage. What
do you do next?
4
Submission: for each sub question from Question 2, please submit :
1) your steps of doing the work, including firewall rule writing, test writing, adding
new stream etc. Please include explanations on what you're doing for each step. You
can provide screenshots as well, if you feel it's more convenient.
2) your evidence from which we can see your solution is working or not working,
which can be in screenshot or other formats.