SlideShare une entreprise Scribd logo
1  sur  16
Implementation of secure mail server
       in cloud environment



       Advanced Network Security
            Dr.Azizol Abdullah
Team Work


Nadim K. Madi
Solmaz Salehian
Farzaneh Masoumiyan
Abdulraqeb Abdullah
Outlines


I n    t   r   o   d   u   c t   i on
 me    t   h   o   d   o   l o   gy
 Mi    g   r   a   t   i   ng     t o c l oud
  e n   v   i   r   o   n   me    nt
Co     n   c   l   u   s   i o   n?
Mail transfer agent


      MTA




    Postfix


 Transport Layer
 Security(TLS)        Secure Mail server
       &
  SMTP-AUTH
Introduction
Postfix security
 Transport Layer Security (TLS) : make privacy by using
  symmetric cryptography and a keyed message authentication
  code message reliability.

 SMTP-AUTH : which use Simple Authentication and Security
  Layer (SASL) Internet Standard method which can be used with
  protocols such as SMTP for adding authentication support to
  connection-based protocols .

Main aim of using postfix
 significant impact on Internet mail performance and security
Methodology
Linux-based platform has been configured as a server with
   postfix and covers TLS and SMTP_AUTH.

Implementation Steps:
 Installation (postfix)
 Configuration
    Authentication (SMTP_AUTH)
   Digital Certificates
   Encryption
 Testing
Installation
configuration
Authentication
Testing
Testing
Testing
Migrating to cloud environment


• Cloud-Based Email Services:
   – cheaper than running personal email service on-premise.
   – rapidly provision new users. More scalable.
   – Always run the latest software and configurations without upgrade
     hassles.
   – Shift the financial burden from upfront capital expense to ongoing
     operating expense.
Migrating to cloud environment cont ...

7. perform backups new cloud-based email service


6. start using cloud based-email solution


5. Assign the registered domains to several DNS records
                                                            Cloud-
4. forward email from old server to new cloud mailbox     Based Email
                                                            Service

3. create a profile to remember all email accounts


2. setup new users, storage, aliases, and SharePoint

1. new host can import emails from the current one
Conclusion
• A mail server has been configured and tested in Linux
  environment using postfix Email Transfer Agent to
  “send, receive, and deliver” emails.
• The main aim what is ensuring a security level has also been
  achieved using TLS Security Certificates. Also authentication
  mechanism is supported using SMTP-AUTH.
• This implementation can be migrated to cloud-based
  level, over 7 phases to ensure end-to-end functions adaption.
• A further digging for enhancement might be applied in the
  mail transfer agent part. As well as the concept of
  heterogeneity.
,  ,




Thank You for Your Attention

           Q&A

Contenu connexe

En vedette

Presentation1.Ppt Email And Internet
Presentation1.Ppt Email And InternetPresentation1.Ppt Email And Internet
Presentation1.Ppt Email And Internetaggregate
 
All about email
All about emailAll about email
All about emailestefana4
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic MailPeter R. Egli
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpointguested929b
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 

En vedette (10)

How Email Works
How Email WorksHow Email Works
How Email Works
 
how email works
how email workshow email works
how email works
 
Presentation1.Ppt Email And Internet
Presentation1.Ppt Email And InternetPresentation1.Ppt Email And Internet
Presentation1.Ppt Email And Internet
 
All about email
All about emailAll about email
All about email
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
Email ppt
Email pptEmail ppt
Email ppt
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Similaire à Implementation of secure email server in cloud environment copy1

Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosGina Montgomery, V-TSP
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Finalniallmmackey
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overviewrsnarayanan
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM DatapowerSigortam.net
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird iiBanukaVidusanka
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayandreasschuster
 
CloudMail Slick
CloudMail SlickCloudMail Slick
CloudMail SlickRapidScale
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...Mithi SkyConnect
 
TechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 OverviewTechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 OverviewMicrosoft TechNet
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Vaultastic
 
CensorNet MailSafe
CensorNet MailSafeCensorNet MailSafe
CensorNet MailSafetlloyduk
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxdeanmtaylor1545
 
10135 a 06
10135 a 0610135 a 06
10135 a 06Bố Su
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Vaultastic
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposalOsman Suliman
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Private Cloud
 

Similaire à Implementation of secure email server in cloud environment copy1 (20)

Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Final
 
SkyConnect
SkyConnectSkyConnect
SkyConnect
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overview
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
SSO with kerberos
SSO with kerberosSSO with kerberos
SSO with kerberos
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gateway
 
CloudMail Slick
CloudMail SlickCloudMail Slick
CloudMail Slick
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Lab08Email
Lab08EmailLab08Email
Lab08Email
 
TechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 OverviewTechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 Overview
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?
 
CensorNet MailSafe
CensorNet MailSafeCensorNet MailSafe
CensorNet MailSafe
 
Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
 
10135 a 06
10135 a 0610135 a 06
10135 a 06
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 

Dernier

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Implementation of secure email server in cloud environment copy1

  • 1. Implementation of secure mail server in cloud environment Advanced Network Security Dr.Azizol Abdullah
  • 2. Team Work Nadim K. Madi Solmaz Salehian Farzaneh Masoumiyan Abdulraqeb Abdullah
  • 3. Outlines I n t r o d u c t i on  me t h o d o l o gy  Mi g r a t i ng t o c l oud e n v i r o n me nt Co n c l u s i o n?
  • 4. Mail transfer agent MTA Postfix Transport Layer Security(TLS) Secure Mail server & SMTP-AUTH
  • 5. Introduction Postfix security  Transport Layer Security (TLS) : make privacy by using symmetric cryptography and a keyed message authentication code message reliability.  SMTP-AUTH : which use Simple Authentication and Security Layer (SASL) Internet Standard method which can be used with protocols such as SMTP for adding authentication support to connection-based protocols . Main aim of using postfix  significant impact on Internet mail performance and security
  • 6. Methodology Linux-based platform has been configured as a server with postfix and covers TLS and SMTP_AUTH. Implementation Steps:  Installation (postfix)  Configuration Authentication (SMTP_AUTH) Digital Certificates Encryption  Testing
  • 13. Migrating to cloud environment • Cloud-Based Email Services: – cheaper than running personal email service on-premise. – rapidly provision new users. More scalable. – Always run the latest software and configurations without upgrade hassles. – Shift the financial burden from upfront capital expense to ongoing operating expense.
  • 14. Migrating to cloud environment cont ... 7. perform backups new cloud-based email service 6. start using cloud based-email solution 5. Assign the registered domains to several DNS records Cloud- 4. forward email from old server to new cloud mailbox Based Email Service 3. create a profile to remember all email accounts 2. setup new users, storage, aliases, and SharePoint 1. new host can import emails from the current one
  • 15. Conclusion • A mail server has been configured and tested in Linux environment using postfix Email Transfer Agent to “send, receive, and deliver” emails. • The main aim what is ensuring a security level has also been achieved using TLS Security Certificates. Also authentication mechanism is supported using SMTP-AUTH. • This implementation can be migrated to cloud-based level, over 7 phases to ensure end-to-end functions adaption. • A further digging for enhancement might be applied in the mail transfer agent part. As well as the concept of heterogeneity.
  • 16. ,  , Thank You for Your Attention Q&A

Notes de l'éditeur

  1. 2nd: … between local-based mail system and cloud-based mail system.3rd: to handle more multiple process concurrently. Combining several platforms together.