1 Figure 9-6: E-Mail Security E-Mail Technology  E-Mail Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Breaking Trust On The Internet
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Mozilla Thunderbird. What is Thunderbird? client client Usenet newsgroup reader Usenet newsgroup reader RSS client RSS client Comparable.
Product and Technology News Georg Bommer, Inter-Networking AG (Switzerland)
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Lesson 7: Business, , & Personal Information Management
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
PYP002 Intro.to Computer Science Working with 1 Working With Chapter 18.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Guide to Operating System Security Chapter 10 Security.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Networked Applications Chapter 11 Updated January 2009 Raymond Panko’s Business Data Networks.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Chapter 7: Using Windows Servers to Share Information.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Chapter 6: Web Security Security+ Guide to Network Security Fundamentals Second Edition.
Security Awareness Chapter 3 Internet Security. Security Awareness, 3 rd Edition2 Objectives After completing this chapter, you should be able to do the.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Masud Hasan Secue VS Hushmail Project 2.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
1 Application Security: Electronic Commerce and Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
(or ?) Short for Electronic Mail The transmission of messages over networks.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
1. What is desktop publishing software used for? 2.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Security Technology Clients and Mail Servers
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
SMTP / MIME Florin Zidaru.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
1 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Cost of disruptions  The cost of loss of reputation.
Security fundamentals Topic 9 Securing internet messaging.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 11 Panko and Panko Business Data Networks and Security, 10 th Edition, Global Edition Copyright © 2015 Pearson Education, Ltd. Panko and Panko.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
Tonga Institute of Higher Education IT 141: Information Systems
Internet Business Associate v2.0
S/MIME T ANANDHAN.
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Chapter 7 Network Applications
Presentation transcript:

1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange, and Lotus/IBM Notes dominate on Windows servers Microsoft Outlook Express is safer than full- featured Outlook because Outlook Express generally does not execute content

2 Figure 9-7: Standards Sending Client Sender’s Mail Server Receiver’s Mail Server SMTP to Send POP or IMAP to Download SMTP to Send Receiving Client Message RFC 822 or 2822 body HTML body

3 Figure 9-6: Security Technology  SMTP to send messages from client to mail server or from mail server to mail server  To download messages to client program from receiver’s mail server POP: Simple and popular; manage mail on client PC IMAP: Can manage messages on mail server

4 Figure 9-6: Security Technology  bodies RFC 822 / RFC 2822: Plain English text HTML bodies: Graphics, fonts, etc. HTML bodies might contain scripts, which might execute automatically when user opens the message  Web-based needs only a browser on the client PC

5 Figure 9-8: Web-Based Client’s Browser Webserver Program HTTP Request Message HTTP Response Message Webpage Containing Message Client PC Webserver with Web-Based Almost all client PCs now have browsers. No need to install new software

6 Figure 9-6: Security Content Filtering  Antivirus filtering and filtering for other executable code Especially dangerous because of scripts in HTML bodies  Spam: Unsolicited commercial

7 Figure 9-6: Security Content Filtering  Volume is growing rapidly: Slowing and annoying users (porno and fraud)  Filtering for spam also rejects some legitimate messages  Sometimes employees attack spammers back; only hurts spoofed sender and the company could be sued

8 Figure 9-6: Security Inappropriate Content  Companies often filter for sexually or racially harassing messages  Could be sued for not doing so

9 Figure 9-6: Security Retention  On hard disk and tape for some period of time  Benefit: Can find information  Drawback: Can be discovered in legal contests; could be embarrassing  Must retain some messages for legal purposes

10 Figure 9-6: Security Retention  Shredding on receiver’s computer to take messages back Send key to decrypt Make key useless after retention period so cannot retrieve anymore Might be able to copy or print before retention limit date Not good for contracts because receiver must be able to keep a copy

11 Figure 9-6: Security Retention  Message authentication to prevent spoofed sender addresses  Employee training is not private; company has right to read Your messages may be forwarded without permission Never put anything in a message they would not want to see in court, printed in the newspapers, or read by their boss Never forward messages without permission

12 Figure 9-6: Security Encryption  Not widely used because of lack of clear standards  PGP and S/MIME for end-to-end encryption How to get public keys of true parties?  PGP uses trust among circles of friends: If A trusts B, and B trusts C, A may trust C’s list of public keys Dangerous: Misplaced trust can spread bogus key/name pairs widely

13 Figure 9-9: Cryptographic Protection for Mail Server Sending Client Receiving Client SMTP, POP, etc. Over TLS SMTP, POP, etc. over TLS S/MIME with PKI or PGP with Circles of Trust

14 Figure 9-6: Security Encryption  Not widely used because of lack of clear standards  PGP and S/MIME for end-to-end encryption How to get public keys of true parties?  S/MIME requires expensive and cumbersome PKI

15 Figure 9-6: Security Encryption  PGP and S/MIME for end-to-end encryption Ease of use  S/MIME usually built in if available at all  PGP usually a cumbersome add-on to  TLS Between client and server