P REVENTING D ATA L EAKAGE VIA E MAIL Rostislav Pinski Dmitry Kaganov Eli Shtein Alexander Gorohovski.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with 2nd Request Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Why Eve & Mallory Love Android
Academic Advisor: Dr. Yuval Elovici Technical Advisor: Polina Zilberman Team Members: Dmitry Kaganov Rostislav Pinski Eli Shtein Alexander Gorohovski.
Page 1 of 14 To the Voltage Online Training Course Voltage encryption is used to protect sensitive and personal information sent via to external.
An introduction to the State’s Encryption Service State of Minnesota Office of Enterprise Technology and Department of Human Services.
Call Server LIS VPC ESGW SR Manhattan PSAP LO=Wall St Route=Manhattan PSAP The Location Object (LO) is provided in the call setup information to the Call.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Sandhills Center Encryption Overview for External Recipients
Online Login Security Enhancement Creating an online username & password January, 2015.
New Timesheets & Payroll Processing for IHSS Providers
Standard Grade Computing Electronic Communication.
s. Why use s?  send a message any time, any where and the recipient can read it at his or her convenience.  same message to several people.
Academic Advisor: Dr. Yuval Elovici Technical Advisor: Polina Zilberman Team Members: Dmitry Kaganov Rostislav Pinski Eli Shtein Alexander Gorohovski.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Follow these instructions to pay your dues. Get into your web browser Like Internet Explorer Now you need type in this address in the Address bar. Example.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Series DATA MANAGEMENT. 1 Why ? Alarm/Status Notification –Remote unattended sites »Pumping stations –Pharmaceutical/Plant maintenance.
A quick course on the new. GCA Webmail can be accessed by clicking on the Webmail link in the GCA page, or by going to either or .gcasda.org.
Contact Everyone send SMS anywhere
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
Question: What is Secure Envelope?
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
1 What is Electronic Mail Exchanging information via computer networks Electronic mail addresses SMTP (Simple Mail Transfer Protocol) Client/Server based.
1 of 4 Use Microsoft ® Office Communicator 2007 for secure Instant Messaging (IM) your Microsoft ® Exchange Server 2007, MSN, AOL, and Yahoo! contacts.
English Comprehension and Composition – Lecture 25 Objectives: What is an ? Basics of an Tips for Writing Effective s.
| 1 ODR CASE STUDY Center for Copyright Information - Independent Review Process Diana N. Didia ODR 2015 | Pace Law School June 5, 2015.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style COPS: Community-Oriented Privacy System The Prototype.
Chpter8: Using responsibly. Step 1: Keep personal to a minimum  Keep personal messages sent from your work account short and few in number,
Unit 6 Tracking Internet Crime. Tracing In general, is also going to be one of the easiest forms to track and trace. service providers.
Let’s Make An Form! Bonney Armstrong GD 444 Westwood College February 9, 2005.
Mod 0479 – Inclusion of as a valid code communication NGN to provide a view on legal status of , a definition of what is an e- mail communication.
Wire Fraud. Prevention Avoid sending sensitive financial information via . Use encrypted . Educate clients about fraud. Contact the intended.
Click your mouse to continue. Ways to Merge Data When you have finished editing your main document and inserting the merge fields, you have several choices.
By: Star Duncan & Hannah Cole Computer Apps 4 th Period.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Prepared By Ahmed Obaid Wassim Salem Supervised.
Contacting Emergency Service Require mobiles to convey emergency indicator in SIP messages Require mobile to uses SLP to learn E-SIP server IP address.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Academic Advisor: Dr. Yuval Elovici Technical Advisor: Polina Zilberman Team Members: Dmitry Kaganov Rostislav Pinski Eli Shtein Alexander Gorohovski.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
EVON TAN KA VUN THECLA JOSEPH NOR FAEEZA ISMALI JESSICCA TOKIROI.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
NEW FOR 2009 Faster, Easier, Friendlier. Before you start Any student, staff, or faculty member can file an accident/incident report. Accident reporting.
You have just scheduled an appointment with Margaret Smith, a client, for Thursday, February 19 th at noon. It is currently February 12 th.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pivot: Researcher Home Page. Today’s Agenda Overview of what Pivot is and how you can access Learn about claiming profiles – who should do it, how you.
Secure . is a means of exchanging digital messages from an author to one or more recipients – it is instant with no delay or postal costs.
Creating and Using Your FSA ID: An Overview
Technical Awareness on Analysis of Headers.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Welcome to Good Reading Online (GRO). Part 2 of this tutorial will show you how to use some of the additional options within GRO, such as printing and.
1 Using the mail.cozzini.com Address Book. 2 Sending a new Click on New button.
Modification: Inclusion of as a valid UNC communication Allowing as a valid form of UNC communication in specific circumstances.
Secure Communications Tony Payne YJB IT Security Officer
Yahoo Help Phone Number Get Instant Help.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
James G. Connell, III CJA Panel Training Program May 13, 2016.
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers By Kartik Patel.
Welcome to a new way forward
Project Management: Messages
Online Training Course
Hosted Fax Self-Paced User Training
Whether you decide to use hidden frames or XMLHttp, there are several things you'll need to consider when building an Ajax application. Expanding the role.
Create Your Own Cryptocurrency Exchange – Know These Benefits.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
X-Road as a Platform to Exchange MyData
Presentation transcript:

P REVENTING D ATA L EAKAGE VIA E MAIL Rostislav Pinski Dmitry Kaganov Eli Shtein Alexander Gorohovski

 Most of the people that use communication can confirm that at least once they have sent an to the wrong recipient.  Such a mistake can be very damaging. Inappropriate jokes may be sent to a supervisor, financial reports may be sent to a competitor or a broker, love letter to the wrong man or woman.  An example of such incident was published on portfolio.com site on February 5th 2008: “One of Eli Lilly & Co.'s sub-contracted lawyers at Philadelphia based Pepper Hamilton had mistakenly ed confidential Eli Lilly's discussions to Times reporter Alex Berenson (instead of Bradford Berenson, her co-counsel), costing Eli Lilly nearly $1 billion.”

 Modern business activities rely on extensive exchange. “wrong recipients” mistakes have become widespread, and the severe damage caused by such mistakes constitutes a disturbing problem both for organizations and for individuals.  Various solutions to this problem are continuously emerging, however there is still no “silver-bullet” solution: many addressing mistakes are not detected and in many cases correct recipients are wrongly marked as potential addressing mistake.

To develop a “ Preventing Data Leakage via » system for some client. The system will work using a theoretic model developed by Douche Telecom researchers and presented in the “Analyzing Group Communication for Preventing Data Leakage via “ article.

 The user composes an and pushes “send” button.  The is sent for inspection and validation by the system.  In case non-valid recipients are detected, a list of non- valid recipients will be displayed to the user for confirmation whether to continue sending to the non-valid recipients or no.  Optionally - a list of additional suggested recipients for this will be displayed to the user.  Optionally - the user will be able to send the easily to any of the recipients from the suggested recipients list.

 Changing the “send” button functionality (without having an access to its’ code).  Developing a system that can be relative easily adapted to any client.  Developing a server that can serve a plenty of clients simultaneously.  The delay in sending the should be linear to the s’ size and not longer than half a minute.  Data Security  Modularity