Electronic mail, most commonly called email or e-mail since around 1993
E-mail is one of the most widely used forms of communication today.
E-mail is faster and cheaper than traditional postal mail, but at least when you seal that envelope and stick a stamp on it, you can have some confidence that only the intended recipient will open it.
With e-mail, however, your message could be intercepted midstream, and you might never realize it. You have to take steps to secure and protect your e-mail messages.
http://phpexecutor.com
2. What is Email ?
• Electronic mail, most commonly called email or e-mail since
around 1993
• E-mail is one of the most widely used forms of communication
today.
• E-mail is faster and cheaper than traditional postal mail, but at
least when you seal that envelope and stick a stamp on it, you
can have some confidence that only the intended recipient
will open it.
• With e-mail, however, your message could be intercepted
midstream, and you might never realize it. You have to take
steps to secure and protect your e-mail messages.
3. What is Email Security ?
• Email security give the surety about secure email.
• Email security has become a hot topic in Information
Technology , but it can pose a number of security threats,
both with incoming and outgoing messages.
• Email security is a priority for all businesses, with the growing
threat of hackers, viruses spam, phishing and identity theft, as
well as the need to secure business information.
4. Email security cont..
• Email security is dealing with issues of unauthorized access
and inspection of electronic mail. This unauthorized access
can happen while an email is in transit, as well as when it is
stored on email servers or on a user computer.
• Email has to go through potentially untrusted intermediate
computers (email servers, ISPs) before reaching its
destination, and there is no way to tell if it was accessed by an
unauthorized entity.
5. WHAT DOESEMAILSECURITYINVOLVE?
• The three main principles of Information Security involve
• Maintaining the confidentiality,
• Integrity, and
• Availability of information resources.
• These three principles can be directly applied to the area of email
security as well.
• Confidentiality of email involves making sure it is protected from
unauthorized access
• Integrity of email involves a guarantee that it has not be modified or
destroyed by an unauthorized individual.
• Availability of email involves ensuring that mail servers remain
online and able to service the user community.
• A weakness in any one of these three key areas will undermine the
security posture of an email system and open the door to
exploitation.
6. How to secure Email
• Web browsers maintain a history of visited sites, and a cache
of browser data that help them load frequently visited pages
more quickly. The history and cache may also inadvertently
expose your e-mail messages. When you are done using your
Web mail, you can go into the settings for the browser and
clear out the cache.
• Better yet, use private browsing. The most popular Web
browsers--such as Internet Explorer, Firefox, and Chrome--
have an option to surf the Web using a private or anonymous
mode. When you use the private browsing mode, your entire
Web session is more secure, since no data is retained in the
history or cache
7. How to secure email cont..
• Privacy mode or "private browsing" or "incognito mode" is a
privacy feature in some web browsers to
disable browsing history and the web cache. This allows a
person to browse the Web without storing local data that
could be retrieved at a later date
8. WHAT ARE THE THREATS TO EMAIL
SECURITY?
• Viruses
• SPAM
• Clicking on links attached in Emails
• Open attachments if the sender is unidentified