Security fundamentals Topic 9 Securing internet messaging.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson 7: Business, , & Personal Information Management
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Security Jonathan Calazan December 12, 2005.
Guide to Operating System Security Chapter 10 Security.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Chapter 6: Web Security Security+ Guide to Network Security Fundamentals Second Edition.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Masud Hasan Secue VS Hushmail Project 2.
BUSINESS B1 Information Security.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
(or ?) Short for Electronic Mail The transmission of messages over networks.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Module 6 Planning and Deploying Messaging Security.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Types of Electronic Infection
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
TCP/IP (Transmission Control Protocol / Internet Protocol)
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Secure  Message interception (confidentiality)  Message interception (blocked delivery)  Message interception and subsequent replay  Message.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Principles of Computer Security, Fourth Edition Copyright © 2016 by McGraw-Hill Education. All rights reserved. and Instant Messaging Chapter 16.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Lesson Background  is the most popular application on the Internet and the intranet.  Twelve million s were sent each day in.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
Network System Security - Task 2. Russell Johnston.
TMG Client Protection 6NPS – Session 7.
Internet Business Associate v2.0
CIW Lesson 7 Part A Name: _______________________________________
Module 4 System and Application Security
Presentation transcript:

Security fundamentals Topic 9 Securing internet messaging

Agenda Secure mail servers Secure mail clients Secure instant messaging (IM)

security basics Store and forward – Send message to mail server, mail server delivers message to server with recipient’s mailbox IMAP – reads the message on the mail server POP – downloads mail from mailbox to the client DNS MX (Mail Exchange) to route the message sent in ASCII format MIME extensions to convert any file to ASCII and attach to an Mail header contains information about the message, attachments and mail servers

security basics Protocols: SMTP sends to mail server and sends from mail servers to other mail servers POP retrieves mail for the client from a mailbox on a mail server IMAP views messages in the mailbox on the mail server Standard issues: No encryption No authentication from sender No integrity of message

Spam – Mass mailings of mail Unsolicited Commercial – Mass mailings to mailing lists for advertising Issues with spam and UCE – Uses network capacity – Clogs up users mailboxes – Significant costs with

Spam Best practise – Filters on mail servers and/or mail clients – Block from blacklist servers – Teach users: Never respond to spam Don’t post an address on a web site Use a second address for newsgroups Know how your address will be used if you provide it: check the privacy statement Use a spam filter or junk filter

Scams and hoaxes Create a policy that prohibits the release of sensitive information through inappropriate channels Define what is sensitive Define what is inappropriate channels Educate users Hoaxes – Seek to spread misleading information somewhat like a chain letter

Scams and hoaxes Issues with hoaxes – Uses network capacity – Malicious, may instruct users to delete files Create a written policy that prohibits the forwarding of known hoaxes Educate users to watch out for s with these headers – Urgent, tell all your friends, this isn't a hoax, dire consequences, history FW >>> – Forward s to technical support – Keep virus scanners up-to-date

Securing mail servers Common attacks against mail servers – Data theft or tampering – Denial of Service – Spam, scams and hoaxes – Spoofing (IPs) – Mail relay (with unauthenticated servers) – virus Protecting mail servers – Remove unnecessary components – Block unused protocols – Disable relaying from unauthenticated connections – Configure an SMTP bridgehead server – only receives SMTP messages from internet and forwards – single purpose easier to secure – Install virus filters and antivirus software – signatures up-to-date – Keep software up-to-date

Access control Client access (users with mailboxes) – POP transmits credentials in clear text Use SPA (Secure Password Authentication) or APOP (Authenticated POP) Use IPSec to encrypt messages and authentication – Proprietary protocols such as MAPI Configure in a secure manner – Web based Configure SSL and allow only https connections – SMTP Require authentication and use SPA

SMTP relay The process of forwarding messages to another server Spammers may attempt to forward to your server for relaying to another server (allows blacklisted servers to move spam into legitimate mail channels) Open relays – servers that accept and relay all traffic Monitoring – Filter executable attachments such as.exe,.zip – Monitor outgoing for confidential – Monitor employee communications – Australian Telecommunications Act

Securing clients Common attacks against clients – Spoofing with a false return address – Eavesdropping headers and contents in clear text – HTML vulnerabilities, Java, Microsoft® ActiveX, scripting – Not patched, security updates not applied – Viruses and trojans – Web based that bypass corporate servers security policy

Encryption and signing PGP (Pretty Good Privacy) – Encrypt, decrypt and sign , files, some IMs and VPNs – Exchange, Microsoft® Outlook®, Microsoft® Outlook Express®, Eudora® (Eudora is a registered trademark of QUALCOMM Incorporated) and Lotus Notes® – No CA, you must provide public key to partners – You store others public keys on a key ring stored locally – Others encrypt with your public key, you decrypt with your private key – Sign with your private key, others ensure integrity with your public key S/MIME (Secure Multipurpose Internet Mail Extensions) – Encrypts and digitally signs – Uses PKI and certificates Both use public key encryption (key pair of public/private keys) Both provide encryption and authentication

Securing instant messaging Real-time messages, files, audio and video Significant security risks Threats: – Unencrypted data transfer – messages in clear text – Transferred files might bypass virus scanners (on servers) – Vulnerabilities such as buffer overflows – Disclosure of sensitive information through social engineering

Securing instant messaging Instant messaging security – Restrict the types authorised for use (easier to support) – Use an IM that supports encryption – Create an acceptable use policy for instant messaging – Educate users on the dangers (particularly file transfer) – Update virus scanners and run scans – Patch and monitor security vulnerabilities – Maintain an IM server for internal use with no traffic to the outside

Lesson overview How to go about securing mail servers and clients How to go about securing instant messaging