SHASHANK MASHETTY Email security. Introduction Electronic mail most commonly referred to as email or e- mail. Electronic mail is one of the most commonly.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Basic Communication on the Internet:
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
How secure is your ? Secure Primer Presented by 4Secur .com.
Lesson 7: Business, , & Personal Information Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Quiz Review.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
BUSINESS B1 Information Security.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Types of Electronic Infection
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
What is Spam? d min.
Security fundamentals Topic 9 Securing internet messaging.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
E-Commerce & Bank Security By: Mark Reed COSC 480.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Network System Security - Task 2. Russell Johnston.
Unit 3 Section 6.4: Internet Security
Done by… Hanoof Al-Khaldi Information Assurance
Internet Business Associate v2.0
IT Security  .
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
CIW Lesson 7 Part A Name: _______________________________________
Protect Your Computer Against Harmful Attacks!
Malware, Phishing and Network Policies
HOW DO I KEEP MY COMPUTER SAFE?
ONLINE SECURE DATA SERVICE
Module 4 System and Application Security
Cybersecurity Simplified: Phishing
Presentation transcript:

SHASHANK MASHETTY security

Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly used services on the Internet allowing people to send messages to one or more recipients. Modern operates across the internet and computer networks. The messages can be notes entered from the keyboard or electronic files stored on the disk.

Why do we need secure ?  Protect sensitive data  Prove authenticity to recipients  Send attachments that are normally filtered  Avoid the junk folder

security enhancements  Authentication  Confidentiality  Confidentiality and authentication  Message intigrity

Threats enabled by  Spam  Spoofing  Phishing  Disclosure of sensitive information  Exposure of systems to malicious code  Denial-of-service(dos)  Un authorized access

threats  Spam  spam is the scourge of around the world  it makes as 95% of all on the internet  spammers get address from new groups, un scrupulous web site operators  A large proportion of spam contains malware or links to web sites that contain malware

threats  Spoofing  spoofing occurs when an attacker sends you an pretending to be some one to you  spoofing is easy to do and very difficult to trace the real sender.  Phishing  Phishing s appear very authentic and often include graphics or logos that are actually from your bank.

based attacks  Active content attack - clean up at the server  Buffer over-flow attack - fix the code  Shell script attack - scan before send to the shell  Trojan horse attack - use do not automatically use the macro option

Choices available in the secure  PGP ( pretty good policy )  S/MIME  Special providers  SSL/TLS web browser based  SSL/TLS POP/SMPS

PGP  Functionality: -encryption for confidentiality -signature for non repudiation/authenticity  Requires key exchange and key management  Not scalable  Small industry support  Can only exchange secure with other PGP users

S/MIME  Similar to PGP, requires administrator installation and configuration support intensive  User must download and install software  Many installations have failed due to complexity  Can only exchange s with other S/MIME users

Special providers  Managed services using S/MIME with PKI key exchange  Appliance based services with special hardware requires integration  expensive

Secure web mail  Nothing to download or install, no support issues beyond typical .  Works with any web browser  Uses SSL/TLS security, same system used by banks, visa, etc  Easy to add, manage users  No training is needed it is simple

POP/SMTP Secure Mail  Works with all programs  Uses SSL/TLS security same system used by banks, visa, etc  Easy to set up, no download or installation, same issues as traditional

Steps to secure mail  Generate an identity  Configure secure software  Get public keys for recipients  Start sending secured messages

Tips to be secure  Never click on a suspect .  Never reply to a suspect with personal information  Look at the grammatical errors in the  Contact your bank via telephone ( get the telephone number from the website rather than the you received ) if you suspect a fraud  Watch for the small changes on your financial statements to avoid detection

Questions?