Module 6. Securing Email Communication
SECURING EMAIL COMMUNICATION
EMAIL
Used to communicate electronically by sending messages from one computer to another via the Internet
SPAMS AND FILTERING
Spam refers to unsolicited commercial emails; filtering helps discard or redirect unwanted messages
USER CONSIDERATIONS
Users choose email clients based on these considerations: security, privacy, visual appeal reliability, availability, and ease of use
DIGITAL SIGNATURE AND ENCRYPTION
Digital signatures verify authenticity, while encryption secures messages from unauthorized access
SECURITY THREATS
Several threats in Email Communication are: malicious email attachments, malicious user redirection, phishing, hoax mail, and spam
SYMMETRIC & ASYMMETRIC ENCRYPTION
Symmetric encryption uses a single key, while asymmetric encryption uses a public-private key pair
PHISHING AND HOAX EMAIL
Phishing tricks users into revealing sensitive data, while hoax emails are forged to compromise security
HASH FUNCTION
A hash function (also known as one-way encryption or message digest) is an encryption process that does not use keys but converts the plain text into a fixed-length hash value based on its content.
Comments
Post a Comment