Module 6. Securing Email Communication

   

SECURING EMAIL COMMUNICATION




EMAIL

Used to communicate electronically by sending messages from one computer to another via the Internet

SPAMS AND FILTERING

Spam refers to unsolicited commercial emails; filtering helps discard or redirect unwanted messages

USER CONSIDERATIONS

Users choose email clients based on these considerations: security, privacy, visual appeal reliability, availability, and ease of use

DIGITAL SIGNATURE AND ENCRYPTION

Digital signatures verify authenticity, while encryption secures messages from unauthorized access


SECURITY THREATS

Several threats in Email Communication are: malicious email attachments, malicious user redirection, phishing, hoax mail, and spam

SYMMETRIC & ASYMMETRIC ENCRYPTION

Symmetric encryption uses a single key, while asymmetric encryption uses a public-private key pair

PHISHING AND HOAX EMAIL

Phishing tricks users into revealing sensitive data, while hoax emails are forged to compromise security

HASH FUNCTION

A hash function (also known as one-way encryption or message digest) is an encryption process that does not use keys but converts the plain text into a fixed-length hash value based on its content.

Comments

Popular posts from this blog

Module 4. Internet Security

Module 2. Securing Operating System

Module 1. Introduction to Data Security