SlideShare a Scribd company logo
Email Security
Submitted by
Mr. Abhishek Kumar
Mr. Baliram Yadav
Submitted to
MS. Swati Rampal
Introduction
 Email is one of the mostly used and regarded network
services.
 Email security is dealing with the issues of unauthorized
access and inspection of electronic Mail.
 Email has to go many untrusted servers before it reached
to its destination.
 One can intercept and modify it to harm the sender and to
make some profits.
Threats to Email
 Message interception
 Emails sent in clear text over the Internet.
 Message modification
 Anyone with system admin rights on the mail servers your
message visits can not only read your message, but also
delete or change the message before it reaches its
destination (and the recipient won’t be able to tell if the
message has been modified).
 False messages
 It is very easy to create an email with someone else’s name
and address.
Contd..
 Message Replay
 Messages can be saved,
modified, and re-sent later.
 Repudiation
 You can’t prove that someone
sent you a message since email
messages can be forged.

Recommended for you

Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)

SSL is an internet protocol for secure exchange of information between a web browser and a web server.

handshake protocolhttpsrecord protocol
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques

The document discusses various authentication techniques, including: - Password-based authentication using clear text passwords, message digests of passwords, and adding randomness with challenges. - Authentication tokens, which generate one-time passwords based on a seed value stored in the token and authentication server database. - Multifactor authentication using passwords, biometrics, and authentication tokens or smart cards. - Certificate-based authentication using digital certificates issued in a public key infrastructure for verifying user identities.

Hash Function
Hash FunctionHash Function
Hash Function

This document discusses message authentication techniques including message encryption, message authentication codes (MACs), and hash functions. It describes how each technique can be used to authenticate messages and protect against various security threats. It also covers how symmetric and asymmetric encryption can provide authentication when used with MACs or digital signatures. Specific MAC and hash functions are examined like HMAC, SHA-1, and SHA-2. X.509 is introduced as a standard for digital certificates.

hashcyber securityhash function
CIA for Email
 Confidentiality: Email should be only viewed by the
person it is intended to.
 Integrity: original content should be received by the
receiver.
 Availability: Receiver should be able to access the mail
whenever he/she requires.
Steps to Secure Email
Security at sender’s side
 Can be implemented by non technical person.
 Use incognito mode while sending emails.
 Avoid using public computers
Security at Receiver’s Side.
 Avoid downloading attachment from unknown sender’s.
 Check Email Headers to verify identity of Sender.
Contd..
Secure transmission of email
 PGP(Pretty Good Privacy)
 S/MIME(Secure Multipurpose Internet Mail Extension)
PGP
 Pretty Good Privacy.
 PGP provides a confidentiality and authentication service
that can be used for electronic mail and file storage
applications.
 Available free worldwide.
 Based on extremely secure algorithm.
 Not developed by governmental organization.

Recommended for you

Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4

The document summarizes authentication methods including Kerberos and X.509. It outlines security concerns around confidentiality and timeliness. It provides an overview of how Kerberos works, including the authentication dialogue process. It also describes X.509 certificates and certification authorities. Recommended reading and websites on authentication topics are listed.

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt

This document provides an overview of cryptography. It defines cryptography as the science of securing messages from attacks. It discusses basic cryptography terms like plain text, cipher text, encryption, decryption, and keys. It describes symmetric key cryptography, where the same key is used for encryption and decryption, and asymmetric key cryptography, which uses different public and private keys. It also covers traditional cipher techniques like substitution and transposition ciphers. The document concludes by listing some applications of cryptography like e-commerce, secure data, and access control.

symmetric-key algorithmcryptographyencryption
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols

The document discusses authentication protocols and digital signatures. It describes mutual authentication protocols that allow two parties to verify each other's identities and exchange session keys. It also discusses one-way authentication protocols. The document focuses on explaining the Digital Signature Standard (DSS) and the Digital Signature Algorithm (DSA). It provides details on how DSA uses public/private key pairs to generate and verify digital signatures for authenticating messages and senders.

mutual authentication protocol.dsa operationsignature generation
S/MIME
 Secure / Multipurpose Internet Mail Extensions.
 S/MIME is standard for exchanging secure mails with the
help of encryption.
 Previously, Mails were supposed to carry text only.
 S/MIME provides support for varying content.
 Supported by major email programs like Outlook,
Netscape.
THANKYOU

More Related Content

What's hot

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
Rajapriya82
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
koolkampus
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
Trinity Dwarka
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Pushkar Dutt
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
Dr.Florence Dayana
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Intruders
IntrudersIntruders
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 

What's hot (20)

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Intruders
IntrudersIntruders
Intruders
 
Web Security
Web SecurityWeb Security
Web Security
 

Similar to Email security

Email security
Email securityEmail security
Email security
SultanErbo
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
Wan Solo
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
IJCSIS Research Publications
 
Netwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of wwwNetwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of www
pratamakiki860
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
Salman Memon
 
Email
EmailEmail
Email
Roy Thomas
 
grade 6.pptx
grade 6.pptxgrade 6.pptx
grade 6.pptx
Manisha367566
 
Email
EmailEmail
E‑mail
E‑mailE‑mail
E‑mail
Mukul Kumar
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
Wan Solo
 
Email Spoofing.pptx
Email Spoofing.pptxEmail Spoofing.pptx
Email Spoofing.pptx
Mumara Campaigns
 
Eseminar1
Eseminar1Eseminar1
email security
email securityemail security
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
ZixMailEncryption.com
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Abid Fakhre Alam
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
ssuserec53e73
 
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxEMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
pkm16499
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
GunjanSharma211
 
CRYPT.pptx
CRYPT.pptxCRYPT.pptx
CRYPT.pptx
VMahesh5
 
Email security
Email securityEmail security
Email security
kumarviji
 

Similar to Email security (20)

Email security
Email securityEmail security
Email security
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
 
Netwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of wwwNetwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of www
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Email
EmailEmail
Email
 
grade 6.pptx
grade 6.pptxgrade 6.pptx
grade 6.pptx
 
Email
EmailEmail
Email
 
E‑mail
E‑mailE‑mail
E‑mail
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Email Spoofing.pptx
Email Spoofing.pptxEmail Spoofing.pptx
Email Spoofing.pptx
 
Eseminar1
Eseminar1Eseminar1
Eseminar1
 
email security
email securityemail security
email security
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxEMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
 
CRYPT.pptx
CRYPT.pptxCRYPT.pptx
CRYPT.pptx
 
Email security
Email securityEmail security
Email security
 

Recently uploaded

Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …
908dutch
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdfAWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
karim wahed
 
NYC 26-Jun-2024 Combined Presentations.pdf
NYC 26-Jun-2024 Combined Presentations.pdfNYC 26-Jun-2024 Combined Presentations.pdf
NYC 26-Jun-2024 Combined Presentations.pdf
AUGNYC
 
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
sudsdeep
 
introduction of Ansys software and basic and advance knowledge of modelling s...
introduction of Ansys software and basic and advance knowledge of modelling s...introduction of Ansys software and basic and advance knowledge of modelling s...
introduction of Ansys software and basic and advance knowledge of modelling s...
sachin chaurasia
 
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTIONBITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
ssuser2b426d1
 
Overview of ERP - Mechlin Technologies.pptx
Overview of ERP - Mechlin Technologies.pptxOverview of ERP - Mechlin Technologies.pptx
Overview of ERP - Mechlin Technologies.pptx
Mitchell Marsh
 
Independence Day Hasn’t Always Been a U.S. Holiday.pdf
Independence Day Hasn’t Always Been a U.S. Holiday.pdfIndependence Day Hasn’t Always Been a U.S. Holiday.pdf
Independence Day Hasn’t Always Been a U.S. Holiday.pdf
Livetecs LLC
 
Leading Project Management Tool Taskruop.pptx
Leading Project Management Tool Taskruop.pptxLeading Project Management Tool Taskruop.pptx
Leading Project Management Tool Taskruop.pptx
taskroupseo
 
Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)
miso_uam
 
Google ML-Kit - Understanding on-device machine learning
Google ML-Kit - Understanding on-device machine learningGoogle ML-Kit - Understanding on-device machine learning
Google ML-Kit - Understanding on-device machine learning
VishrutGoyani1
 
MVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptxMVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptx
Mitchell Marsh
 
What is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for FreeWhat is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for Free
TwisterTools
 
dachnug51 - Whats new in domino 14 .pdf
dachnug51 - Whats new in domino 14  .pdfdachnug51 - Whats new in domino 14  .pdf
dachnug51 - Whats new in domino 14 .pdf
DNUG e.V.
 
Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.
shivamt017
 
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial CompanyNBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Softwares
 
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdfdachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
DNUG e.V.
 
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
Semiosis Software Private Limited
 
ANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdfANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdf
sachin chaurasia
 
Attendance Tracking From Paper To Digital
Attendance Tracking From Paper To DigitalAttendance Tracking From Paper To Digital
Attendance Tracking From Paper To Digital
Task Tracker
 

Recently uploaded (20)

Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdfAWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
 
NYC 26-Jun-2024 Combined Presentations.pdf
NYC 26-Jun-2024 Combined Presentations.pdfNYC 26-Jun-2024 Combined Presentations.pdf
NYC 26-Jun-2024 Combined Presentations.pdf
 
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
 
introduction of Ansys software and basic and advance knowledge of modelling s...
introduction of Ansys software and basic and advance knowledge of modelling s...introduction of Ansys software and basic and advance knowledge of modelling s...
introduction of Ansys software and basic and advance knowledge of modelling s...
 
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTIONBITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
 
Overview of ERP - Mechlin Technologies.pptx
Overview of ERP - Mechlin Technologies.pptxOverview of ERP - Mechlin Technologies.pptx
Overview of ERP - Mechlin Technologies.pptx
 
Independence Day Hasn’t Always Been a U.S. Holiday.pdf
Independence Day Hasn’t Always Been a U.S. Holiday.pdfIndependence Day Hasn’t Always Been a U.S. Holiday.pdf
Independence Day Hasn’t Always Been a U.S. Holiday.pdf
 
Leading Project Management Tool Taskruop.pptx
Leading Project Management Tool Taskruop.pptxLeading Project Management Tool Taskruop.pptx
Leading Project Management Tool Taskruop.pptx
 
Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)
 
Google ML-Kit - Understanding on-device machine learning
Google ML-Kit - Understanding on-device machine learningGoogle ML-Kit - Understanding on-device machine learning
Google ML-Kit - Understanding on-device machine learning
 
MVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptxMVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptx
 
What is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for FreeWhat is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for Free
 
dachnug51 - Whats new in domino 14 .pdf
dachnug51 - Whats new in domino 14  .pdfdachnug51 - Whats new in domino 14  .pdf
dachnug51 - Whats new in domino 14 .pdf
 
Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.
 
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial CompanyNBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial Company
 
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdfdachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
 
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
 
ANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdfANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdf
 
Attendance Tracking From Paper To Digital
Attendance Tracking From Paper To DigitalAttendance Tracking From Paper To Digital
Attendance Tracking From Paper To Digital
 

Email security

  • 1. Email Security Submitted by Mr. Abhishek Kumar Mr. Baliram Yadav Submitted to MS. Swati Rampal
  • 2. Introduction  Email is one of the mostly used and regarded network services.  Email security is dealing with the issues of unauthorized access and inspection of electronic Mail.  Email has to go many untrusted servers before it reached to its destination.  One can intercept and modify it to harm the sender and to make some profits.
  • 3. Threats to Email  Message interception  Emails sent in clear text over the Internet.  Message modification  Anyone with system admin rights on the mail servers your message visits can not only read your message, but also delete or change the message before it reaches its destination (and the recipient won’t be able to tell if the message has been modified).  False messages  It is very easy to create an email with someone else’s name and address.
  • 4. Contd..  Message Replay  Messages can be saved, modified, and re-sent later.  Repudiation  You can’t prove that someone sent you a message since email messages can be forged.
  • 5. CIA for Email  Confidentiality: Email should be only viewed by the person it is intended to.  Integrity: original content should be received by the receiver.  Availability: Receiver should be able to access the mail whenever he/she requires.
  • 6. Steps to Secure Email Security at sender’s side  Can be implemented by non technical person.  Use incognito mode while sending emails.  Avoid using public computers Security at Receiver’s Side.  Avoid downloading attachment from unknown sender’s.  Check Email Headers to verify identity of Sender.
  • 7. Contd.. Secure transmission of email  PGP(Pretty Good Privacy)  S/MIME(Secure Multipurpose Internet Mail Extension)
  • 8. PGP  Pretty Good Privacy.  PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.  Available free worldwide.  Based on extremely secure algorithm.  Not developed by governmental organization.
  • 9. S/MIME  Secure / Multipurpose Internet Mail Extensions.  S/MIME is standard for exchanging secure mails with the help of encryption.  Previously, Mails were supposed to carry text only.  S/MIME provides support for varying content.  Supported by major email programs like Outlook, Netscape.