Security Technology Clients and Mail Servers

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Breaking Trust On The Internet
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Product and Technology News Georg Bommer, Inter-Networking AG (Switzerland)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Lesson 7: Business, , & Personal Information Management
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Guide to Operating System Security Chapter 10 Security.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Networked Applications Chapter 11 Updated January 2009 Raymond Panko’s Business Data Networks.
Deployment Models A. client (no S/MIME) »NHIN-Direct developed security agent »off-the-shelf S/MIME proxy B. client using Native S/MIME »Internet.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Chapter 6: Web Security Security+ Guide to Network Security Fundamentals Second Edition.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Masud Hasan Secue VS Hushmail Project 2.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
1 Application Security: Electronic Commerce and Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
(or ?) Short for Electronic Mail The transmission of messages over networks.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
1 Client Software and Mail Hosts Client PC has client software that communicates with user’s mail host Mail hosts deliver outgoing mail to.
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
SMTP / MIME Florin Zidaru.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Security fundamentals Topic 9 Securing internet messaging.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 11 Panko and Panko Business Data Networks and Security, 10 th Edition, Global Edition Copyright © 2015 Pearson Education, Ltd. Panko and Panko.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Week 7 - Wednesday.  Web security – user side.
© 2015 Pearson Education Ltd. Chapter 8 Chapter 8.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
July 19, Secure Messaging Models Co-existence and Interoperability Russell W. Chung New York, NY July 19, 2005.
Tonga Institute of Higher Education IT 141: Information Systems
Internet Business Associate v2.0
Web Development Web Servers.
CIW Lesson 7 Part A Name: _______________________________________
S/MIME T ANANDHAN.
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Chapter 7 Network Applications
Presentation transcript:

E-Mail Security E-Mail Technology E-Mail Clients and Mail Servers Mail server software: Sendmail on UNIX, Microsoft Exchange, and Lotus/IBM

E-Mail Standards SMTP to Send POP or IMAP to Download SMTP to Send Sender’s Mail Server Receiver’s Mail Server Sending E-Mail Client Receiving E-Mail Client Message RFC 822 or 2822 body HTML body

E-Mail Security E-Mail Technology SMTP to send messages from client to mail server or from mail server to mail server To download messages to client e-mail program from receiver’s mail server POP: Simple and popular; manage mail on client PC IMAP: Can manage messages on mail server

E-Mail Security E-Mail Technology E-mail bodies RFC 822 / RFC 2822: Plain English text HTML bodies: Graphics, fonts, etc. HTML bodies might contain scripts, which might execute automatically when user opens the message Web-based e-mail needs only a browser on the client PC

No need to install new software Web-Based E-Mail Client’s Browser Webserver Program HTTP Request Message HTTP Response Message Webpage Containing Message Client PC Webserver with Web-Based E-Mail Almost all client PCs now have browsers. No need to install new software

E-Mail Security E-Mail Content Filtering Antivirus filtering and filtering for other executable code Especially dangerous because of scripts in HTML bodies Spam: Unsolicited commercial e-mail

E-Mail Security E-Mail Content Filtering Volume is growing rapidly: Slowing and annoying users (porno and fraud) Filtering for spam also rejects some legitimate messages Sometimes employees attack spammers back; only hurts spoofed sender and the company could be sued

E-Mail Security Inappropriate Content Companies often filter for sexually or racially harassing messages Could be sued for not doing so

E-Mail Security E-Mail Retention On hard disk and tape for some period of time Benefit: Can find information Drawback: Can be discovered in legal contests; could be embarrassing Must retain some messages for legal purposes

E-Mail Security E-Mail Retention Shredding on receiver’s computer to take messages back Send key to decrypt Make key useless after retention period so cannot retrieve anymore Might be able to copy or print before retention limit date Not good for contracts because receiver must be able to keep a copy

E-Mail Security E-Mail Retention Message authentication to prevent spoofed sender addresses Employee training E-mail is not private; company has right to read Your messages may be forwarded without permission Never put anything in a message they would not want to see in court, printed in the newspapers, or read by their boss Never forward messages without permission

E-Mail Security E-Mail Encryption Not widely used because of lack of clear standards PGP and S/MIME for end-to-end encryption How to get public keys of true parties? PGP uses trust among circles of friends: If A trusts B, and B trusts C, A may trust C’s list of public keys S/MIME requires expensive and cumbersome PKI

Cryptographic Protection for E-Mail Mail Server SMTP, POP, etc. Over TLS SMTP, POP, etc. over TLS S/MIME with PKI or PGP with Circles of Trust Sending E-Mail Client Receiving E-Mail Client

E-Mail Security E-Mail Encryption PGP and S/MIME for end-to-end encryption Ease of use S/MIME usually built in if available at all PGP usually a cumbersome add-on to e-mail TLS Between client and server