logo

Information Security Assignment | E-mail Security

   

Added on  2020-05-01

21 Pages5314 Words86 Views
Running head: E-MAIL SECURITYE-Mail SecurityName of the StudentName of the UniversityAuthor Note
Information Security Assignment | E-mail Security_1
1E-MAIL SECURITYTable of ContentsIntroduction......................................................................................................................................4E-Mail..............................................................................................................................................4Advantages of E-mail......................................................................................................................5Policing Policies..............................................................................................................................6Basic Principles of E-Mail System..................................................................................................6Basic Communication Protocol...................................................................................................6Syntax and Format Rules.............................................................................................................7Information encoding...................................................................................................................7Problems of E-mail Security............................................................................................................8E-mail Security System.................................................................................................................10Functions of PGP analysis.............................................................................................................12Preventive measures......................................................................................................................13Implementation of management controls..................................................................................13System Implementation.............................................................................................................13Securing the Mail Client............................................................................................................14Securing the Transmission.........................................................................................................14Securing the Supporting Operational Environment...................................................................15Maintaining a Secure Mail System................................................................................................15Protect, Analyze, and Configure Log Files...............................................................................15Back up Data Frequently...........................................................................................................16Protect Against Malware...........................................................................................................16Conclusion.....................................................................................................................................16References:....................................................................................................................................17
Information Security Assignment | E-mail Security_2
2E-MAIL SECURITY
Information Security Assignment | E-mail Security_3
3E-MAIL SECURITYIntroductionIn this new digital world where internet has become an integral part of the individuals, e-mail is playing vital in providing a very easy platform for the communication purpose. It can bereferred as exchange of information digitally. Most of the companies are paying for the extraadvance information security however; they are also neglecting the basic security related to thecommunication. This negligence could lead to several security issues that might affect the dataand information security and could possibly lead to the security breaches. Such intruders couldbe able to take advantage of the email vulnerabilities in manner to circumvent the cyber-defensesystem of the organization and could gain access to the sensitive data and information all aboutthe operational activities of the organization. According to the findings it can be noted that aboutsixty percent of the organizations have not any plan for the security awareness training for theemployees using e-mail for the operational activities. This report focuses on a research on the e-mail security in which problems related to the e-mail security has be proposed including theaddresses that could be helpful in mitigating such problems. Pretty Good Privacy has been alsoaddressed in this report that could be helpful in intruding the traffic system of informationexchange.E-MailE-mail (Electronic mail) can be defined as the exchange of messages stored in the systemusing telecommunication those are generally encoded using ASCII coded text. This also enablesthe users to share non-text files that include images, gifs, audio files, and others in the form ofattachments that could be sent in binary streams (Petry et al., 2014). It was the very first use of
Information Security Assignment | E-mail Security_4
4E-MAIL SECURITYthe internet and now it has become one of the important tools for everyone for the exchange ofinformation and has replaced letters.Advantages of E-mailThere are many advantages of using e-mail that can be listed as:Speed: This is one of the speedy modes for the exchange of information that typicallytook seconds or minutes to travel from address to another.Convenience: It is much fast than making a call or getting engaged on conversation atcertain topics or might face arguments from the facing individual (Badran, Pluye & Grad, 2015).This could be closed type conversation for the users. Attachments: This is the best facility without any service charge that enables the user toexchange information or send a text between the users. As stated earlier it enables the users tosend and receive picture, audio, and other files. Record: using mail services allows the users to keep record of the conversation those arebeing shared between them.Accessibility: E-mails could be accessed and stored in convenient manner in an emailprogram that could be helpful in achieving, organizing, and searching the emails. This impliesthat messages stored in the email program could be accessible and read anytime anywhere viaconnecting to the internet (Rueben & Jakobson, 2013).No limit for the space: It also provides the facility of storing unlimited space for writingand receiving new messages.
Information Security Assignment | E-mail Security_5
5E-MAIL SECURITYPolicing PoliciesIt can be said that acceptable-use policies are virtually universal today, even though thecompanies are neither explaining these policies with their employees nor attempting to informthem about what the policies are. It is all about training the employees about the e–mail policyand creating awareness among them about practicing these policies in the real situations(Ossullivann et al., 2017). Considering the facts related to the outbound email, it can be statedthat training and policy should cover much broad topics related to what are the objectives thatneeds to be considered as a confidential information and which should not (Gu & Fang, 2012).Other objectives are: the appropriate information that should be included while sending outgoinge-mails and restriction for the personal use of the email. Regarding the policies for the usage ofe-mail services, it can be recommended that companies should develop an independent policy forthe encryption of the files and texts while exchanging between two users. There should be accessof these encrypted messages to the limited users and should not be allowed for every employeesto access these information. Pelland (2015) stated that “this can create a security risk. Autoforwarding means the email is sent to an account that isn’t under the control of the ITdepartment”.Basic Principles of E-Mail SystemThere are three basic principles of e-mail system that can be listed as:Basic Communication ProtocolThe transmission of e-mails is takes place through the means of POP3 and SMTP basicprotocols including its expansion agreements. The structure model, command of SMTP protocoland interactive process has been defined by the RFC0821 (Herth et al., 2014). The three kinds of
Information Security Assignment | E-mail Security_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Healthcare Data Security and Data Masking
|22
|6117
|459

Big Data Security
|11
|3107
|67

Document on Network and Security
|20
|6226
|54

Online Research Skills PDF
|10
|2108
|250

Hybrid Security In Virtual Private Networks
|15
|3542
|252

Training Programs for the Appf Members
|41
|13448
|119