0% found this document useful (0 votes)
131 views2 pages

Standards For Email Security

This document discusses standards for email security. It recommends that organizations address security aspects when deploying email servers, ensure email servers are configured securely, and consider implementing encryption technologies. Digital signatures and encryption techniques like symmetric and asymmetric keys can help secure email by authenticating senders and protecting messages from alteration. Message digests also help ensure integrity by allowing receivers to verify messages were not altered in transit.

Uploaded by

Peng Guin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views2 pages

Standards For Email Security

This document discusses standards for email security. It recommends that organizations address security aspects when deploying email servers, ensure email servers are configured securely, and consider implementing encryption technologies. Digital signatures and encryption techniques like symmetric and asymmetric keys can help secure email by authenticating senders and protecting messages from alteration. Message digests also help ensure integrity by allowing receivers to verify messages were not altered in transit.

Uploaded by

Peng Guin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

3.7.

5 EMAIL

STANDARDS FOR EMAIL SECURITY

Email security refers to various cybersecurity measures to secure the access and


content of an email account or service.

Proper email security can protect sensitive information in email communications,


prevent phishing attacks, spear phishing and email spoofing and protect against
unauthorized access, loss or compromise of one or more email addresses.

To improve email security, organizations should:

 Address the security aspects of the deployment of a mail server through maintenance and
administration standards
 Ensure that the mail server application is deployed, configured and managed to meet the
security policy and guidelines instituted by management.
 Consider the implementation of encryption technologies to protect user authentication and mail
data

A digital signature authenticates a communication from a user in an untrusted network environment in


email security. A digital signature is a set of bits that are added to a digital document. Its legitimacy can
be validated in the same way as a handwritten signature can. It is unique to the document being signed,
unlike a handwritten signature. Another use of public key cryptography is digital signatures.

Digital signatures are a good method of securing email transmission because:

 The signature cannot be forged.


 The signature is authentic and encrypted.
 The signature cannot be reused (a signature on one document cannot be transferred to another
document).
 The signed document cannot be altered; any alteration to the document (whether or not it has
been encrypted) renders the signature invalid.

There are two different types of encryption techniques used to ensure security, symmetric key and
asymmetric key system. If the email is protected using a symmetric button at the end of the receiver,
the user must know the one secret button to decode the message. If a public key is used as an
asymmetrical key system, the user must use the private key to decrypt the message and use a digital
signature verification tool to validate the signature at the receiving end.
Message Digest is a technique for ensuring the integrity of data sent across an unsecured channel
(where the content of the message can be changed). A Cryptographic hash function is used to encrypt
the message. This function produces a Digest image, which is a compressed version of the message.

Lets assume, Alice sent a message and digest pair to Bob. To check the integrity of the message Bob runs
the cryptographic hash function on the received message and gets a new digest. Now, Bob will compare
the new digest and the digest sent by Alice. If, both are same then Bob is sure that the original message
is not changed.

This message and digest pair is equivalent to a physical document and fingerprint of a person on that
document. Unlike the physical document and the fingerprint, the message and the digest can be sent
separately.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy