logo

Information Security: Risks, Countermeasures, Cryptographic Protocols, and Network Protocol Defense

This page contains the Learning Resources for this unit. Be sure to scroll down the page to see all of this unit's assigned Learning Resources. In Unit 5, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.

6 Pages957 Words221 Views
   

Added on  2022-11-13

About This Document

This document discusses the risks associated with corporate email, countermeasures and safeguards to e-mail privacy, benefits and drawbacks of cryptographic protocols, and countermeasures to defend network protocol. It also includes references.

Information Security: Risks, Countermeasures, Cryptographic Protocols, and Network Protocol Defense

This page contains the Learning Resources for this unit. Be sure to scroll down the page to see all of this unit's assigned Learning Resources. In Unit 5, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.

   Added on 2022-11-13

ShareRelated Documents
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the Student
Name of the University
Author Note
Information Security: Risks, Countermeasures, Cryptographic Protocols, and Network Protocol Defense_1
1INFORMATION SECURITY
Table of Contents
1. Risk associated with corporate email.....................................................................................2
2. Counter measures and safeguard to e-mail privacy...............................................................2
3.Benefits and drawback of cryptographic protocols:................................................................3
4. Countermeasures to defend network protocol........................................................................4
References:.................................................................................................................................5
Information Security: Risks, Countermeasures, Cryptographic Protocols, and Network Protocol Defense_2
2INFORMATION SECURITY
1. Risk associated with corporate email
The corporate webmail is a convenient service to its employees provided by the
organization. However, it also get opened several potential risks regarding information leaks
to other competitor companies. The two major risks which are associated with the corporate
email are listed below:
i) Human Error: The webmail makes easier for the employees to access to their
official emails. The employees often access their official emails from the outside of the office
too. Suppose any employee logged in to their official id from a public computer, their key
information can be easily monitored by anyone and that person can easily breach into the
employee’s official email id. Another case may arise if the employee forgets to log out from
their official email id which they have opened from the public computers can give easy
access to the computer’s next users.
ii) Easy access to email system: Once the official mail gets hacked it get easier for the
hackers to read confidential mails and also achieve the authority to send mail using
company's official account. Even if the employees of the company does not share their
webmail address, the hackers can easily guess it, as most of the corporate emails address
follows almost a common pattern. The hackers easily guess the login IDs by phishing attack
traps (Meyers et al., 2018). Thereafter, they can log in into the webmail page by hacking it
and easily steal any confidential data associated with the organization.
2. Counter measures and safeguard to e-mail privacy
The official e-mails are often sent outside to some external unauthorized networks
which is beyond the company's security boundary (Chory, Vela & Avtgis, 2016). If these
Information Security: Risks, Countermeasures, Cryptographic Protocols, and Network Protocol Defense_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Identity-Based Auditing Mechanism From RSA
|13
|2910
|12