Email Communication Security

Improved Essays
From a cybersecurity point of view the use of a private electronic mail (email) server must be justified by promoting the security of the email communications. The great value of email is that it permits exchanging messages between almost any two parties without much more preparation than the exchange of the email addresses of the communicating parties. But Goodrich and Tamassia (2011, pp.500-501) explain that fundamental email protocols do not address authentication, integrity or confidentiality issues of secure communications. Sending email uses the Simple Mail Transfer Protocol (SMTP) which is a text based application layer protocol that can be easily monitored, intercepted and even manipulated by unauthorized agents en route.
Whether or
…show more content…
These messages remain behind the corporate firewall, possibly never leaving the email server, where they are better protected from packet sniffing by external agents. Protecting email from packet sniffing by internal agents can be achieved by standard methods applicable to all network traffic. Guarding against ARP spoofing by checking for duplicate MAC addresses and by using static ARP tables, or software solutions such as Xarp and Arpwatch (Goodrich and Tamassia. 2011, pp. 234-235). Dividing the organization 's network into sub-networks by user group function and using Ethernet switches rather than hubs to reduce the amount of different network traffic that is available at each network interface and thus vulnerable to sniffing (Goodrich and Tamassia. 2011, pp. …show more content…
Because both the sending and receiving email servers are under the control of the organization, it can use S/MIME to digitally sign email messages. This authenticates the sender to the receiver and validates the integrity of the message, that it has not been modified in transit (Goodrich and Tamassia. 2011, p. 504). Furthermore, the organization can link their internal access control system to the email server 's list of users to facilitate provisioning email addresses to their employees and decommissioning those addresses when the employee leaves the organization, further authenticating the sender and receiver of emails to each

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Some characteristics may be unanticipated or confusing emails, poor spelling or grammar, requests for personal information, requesting to click on links or verify a message doubtfully. 2. Enhance the security of computers In order to reinforce the company, BWB must establish appropriate security policies or a set of codified standards and implement tools such as antivirus, encryption and patching. Some special software can be install which are specifically designed for phishing such as Kaspersky Internet security, Phish Tank, SmartScreen filter and so on.…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unit 9 P6 Hotmail System

    • 445 Words
    • 2 Pages

    Those who feel that it is not sufficient can check out the enhanced setting offered to make their communication more secure. They will need to click on the "use enhanced security" link that will increase their security level. With this enhanced setting, the platform will use an encrypted page when the users want to sign in but once they have logged in, it will go back to the normal settings for receiving and sending mails. To know that the enhanced settings are in use, most address bars will change in color to signify that it is using the extended validation…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Ashleigh Zoller Interview

    • 260 Words
    • 2 Pages

    All of our internal mail has one signature job title and our phone number any…

    • 260 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Introduction The case, Comcast Corporation v. Federal Communication Commission and Steinbach v. Village of Forest Park discusses important aspects of utilizing the Internet for business and potential technology and privacy concerns. The Internet is growing rapidly. A growing concern to manage the growth and reliability of the Internet is net neutrality. It is important to understand how it can be regulated by the Federal Communication Commission and what authority Internet service providers maintain. As electronic communications are now becoming a staple in individuals and businesses daily operation, it is vital to understand the potential privacy concern of utilizing email.…

    • 1656 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The very idea of a worldwide system that could send messages instantly was a mere fantasy until the year of 1969. Of which the first internet message was sent, “Lo”. In direct result, the era of the Internet was kickstarted into existence. It would be twenty years, in 1989, until the first service providers were erected into existence. Major companies such as Comcast wouldn’t start to provide high speed internet until the late 2000’s.…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Bill Clinton Email Summary

    • 2217 Words
    • 9 Pages

    And while other senior officials had used personal email accounts for official business, including Colin Powell when he was secretary, the rules made clear by the time she became the nation’s top diplomat that using a private server for official business was neither allowed nor encouraged because of “significant security risks.” Mrs. Clinton’s use of a private server was known by some officials beyond her closest aides, but no one in the State Department told her directly to use the department’s official email. When two officials in the record-keeping division raised concerns in 2010, their superior “instructed the staff never to speak of the secretary’s personal email system again,” the report said. The report, as well as an F.B.I. investigation and other legal challenges seeking information about her emails, is certain to keep alive a controversy that has shadowed Mrs. Clinton’s campaign.…

    • 2217 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Spoofing is a type of scam where an intruder attempts to gain unauthorized access to your system or information by pretending to be the actual user. The main purpose is to trick the user into releasing confidential information in order to gain access to one's bank account, computer system or to steal personal information, such as passwords. Hackers use spoofed addresses toFool other computers and double cross them into thinking a message originated from a different machine. There are various types of spoofing such as-…

    • 102 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Strengths: Bria greets the client in a polite and a professional tone. After verifying the email address, She sets the expectations that a registration email has been sent. She foreshadows that the message may go into the junk/ spam folder. Bria is very helpful to ensure MSQ is able to access the account prior to letting her off the line.…

    • 107 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Internet architecture is basically a huge network of thousands of networks communicating using a common protocol. The Internet sends a transmission to a host computer that sends it on to another computer that is connected to the host computers network. If the receiving computer is not connected to the host computers network, the host computer sends it on to another computer that can then send it to the receiving computer. It is not unusual for the message to pass through several routers before it finally reaches its destination. The transmission of these messages from one computer to another is the Internet.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Acar, T., Belenkiy, M., & Küpçü, A. (2013). Single password authentication. Computer Networks, 57(13), 2597-2614. doi:10.1016/j.comnet.2013.05.007 This qualitative analysis illustrates the authors’ proposed protocols for a password authentication system requiring the user to remember only one login and password. Their protocols would allow access to either a cloud server or mobile device to handle all authentication needs.…

    • 1856 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    A) Segmentation means that the market is divided into parts, which are identified, accessible, viable and profitable and has a growth potential. In other words, the company believes it is impossible to target the entire market due to lack of time, cost and effort. It needs a targeted segment- a mass of people who can be identified and targeted with reasonable effort, cost and time. Segmenting the market place correctly can make the difference between successes and shut down for a company. M&S also bases its market segmentation through value, many products in M&S's clothing range have a premium-priced, high quality segment (M&S, Clarks, faith) a mid-priced segment (top shop, River Island) and a lower price segment e.g. shoes.…

    • 1099 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Fear, Ignorance & Myths=Epidemic Proportions A deadly disease spread faster than the science to treat and explain it, but years would go by before the American people would demand to know why, thereby creating a perfect storm. Fear and ignorance such as the idea that HIV was a gay person’s disease and contracting it was God’s punishment would fuel the power vacuum that allowed HIV rates to rise to epidemic proportions. Ultimately, because the American public believed this myth, these factors contribute to the rising body count.…

    • 1027 Words
    • 5 Pages
    Superior Essays

Related Topics