Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 5: Electronic Mail Security - Coggle Diagram
Chapter 5: Electronic Mail Security
Email Security Enhancement
confidentiality
authentication
message integirty
non-repudiation of origin
Email Security Risks
Email Bombing and Chain Letter
Chain Letter:
Components
Hook
Threat
Request
Spreading Malwares
Categories
Viruses
Worms
Trojan Horses
Email Spoofing
Causes
Absence of inbuilt security due to the lack of Simple Mail Transfer Protocol
Email Spamming
Two kinds
Large marketing
small marketers
Protecting E-mail Spamming
SMTP Server Authentication
Host and Network Based Authentication
Web E-mail Interface
POP Before SMTP Authentication
Systematic Spam Preventation
Mail Abuse Prevention System
E-mail Attachment Security
Scan and block all the E-mail attachments
Third-party E-mail Servers:
Works as e-mail firewall
Block the e-mails
Block Malicious Attachments
Preventive Measure
Defend against E-mail security
Evaluate the source of received mail before opening and responding
Disable the preview feature of email client for protection from worms
Treat each received attachment as a reason of virus and worm attack
Best Practices to Ensure Email Security
Educate Employees
Deploy Anti-Phishing Solutions
Implement Data Loss Prevent (DLP)
Use Safe Browsing Solutions
Pretty Good Privacy
Services
Authentication
Confidentiality
Compression
E-mail compatibility
Segmentation
PGP Keys
One-time session symmetric key
Public key
Private key
Passphrase-based symmetric key