Masud Hasan 03-60-475 Secure Email Project 1. Secure Email It uses Digital Certificate combined with S/MIME capable email clients to digitally sign and.

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.
Principles of Information Security, 2nd edition1 Cryptography.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Rural Development Department Government of Tripura Venue: Conference Hall #1, Pragna Bhawan, Gorkhabasti Date: 7 th March, 2014.
Configuring Active Directory Certificate Services Lesson 13.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Masud Hasan Secue VS Hushmail Project 2.
| | Tel: | | Computer Training & Personal Development Microsoft Office PowerPoint 2007 Expert.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Network Security: Security. Objectives To learn to use security tools –PGP To learn the availability of security libraries –S/MIME.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Getting Connected to NGS while on the Road…
Key management issues in PGP
Internet Business Associate v2.0
Security is one of the most widely used and regarded network services
Unit 3 Section 6.4: Internet Security
Meganet Corporation VME Mail 2004
S/MIME T ANANDHAN.
Using SSL – Secure Socket Layer
Digital Signatures and Forms
Pooja programmer,cse department
Getting Connected to NGS while on the Road…
Presentation transcript:

Masud Hasan Secure Project 1

Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and encrypt

Two Basic Features – The two basic features of security are privacy (only the intended recipient can read the message) and authentication (the recipient can be assured of the identity of the sender). The technical capabilities for these functions has been known for many years, but they have only been applied to Internet mail recently.

S/MIME Client –There are currently two actively proposed methods for providing these security services: S/MIME and PGP (both in its early incarnation as PGP/MIME, and as the new OpenPGP standard). – Microsoft Outlook: S/MIME Client.

OnSite Digital Certificate A digital certificate is an electronic means of establishing your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting and decrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.

How it Works –When registering for secure 2 keys are generated : a public key, which is stored in the Global Address List : this is used for encrypting messages sent to you by others. a private key, which is stored in the mail client (Outlook) on your pc : is used for digitally signing your own messages, and for decrypting encrypted messages sent to you.

OnSite System Requirements Operating Systems: Windows 98 native & Second Edition, Windows NT with Service Pack 5, Windows 2000 Power User or with a patch installed by an administrator. Browsers: IE V5sp1 or later, 128 bit encryption enabled (domestic version) programs: Outlook 98 or 2000 Disk Space: Minimal Intel platform. The computer must have at least a 100 MHZ Pentium processor.

OnSite Supported Platforms IE 5.0 SP1 or better is the only web browser currently supported for enrollment. Wireless handheld and palmtop devices are not currently supported for secure . Outlook Web Access does not currently support secure . Alternatives to the standard solution such as PGP may not be used for secure .

OnSite Installation/Enrollment Review the System Requirement Enroll for a Digital Certificate Configure Outlook Account Verify the recipient also has Secure

OnSite Enrollment Steps

OnSite Enrollment Steps

OnSite Configuring Outlook The user must configure their security settings in Outlook to recognize and make use of their newly downloaded personal certificate. This would involve: -Selecting a Signing Certificate -Choosing a hash algorithm -Deciding on a name and format for the settings -Having clear text signed messages sent

OnSite Configuring Outlook

OnSite Configuring Outlook

OnSite Sending Secure Encryption should not be set as a default To send a signed or encrypted message: - Click the lock and seal icons on the toolbar of a new message -or- -Go to Options on the toolbar of a new message and check Encrypt Message and Add Digital Signature

OnSite Receiving Secure No action needs to be taken An encrypted message cannot be viewed in the preview pane, it must be opened The lock and seal icons will appear on the message showing that it has been encrypted and signed

OnSite Services/ Mechanisms and Algorithm Used Services in a security protocol SignaturesEncryption Hashing RSADESSHAI

OnSite How you can secure your ? There are free digital certificates in the web. Microsoft Clients have S/MIME protocol Unix user can use it too Following all the steps, you can secure your .

OnSite Conclusion I have been able to improve my knowledge in Computer Security by learning this tool. My second project will be able to provide more details about PGP mail client using leading encryption techniques and to compare two different technologies for same purpose. Until then, Thanks for listening and good luck for Midterm.

OnSite QUESTIONS Only easy ones will be answered! Kidding~~