SlideShare une entreprise Scribd logo
1  sur  46
Email Security Laleh Tashakori
 
An overview of  Internet E-mail
 
 
Secrecy
 
Integrity
 
Solutions for Security Problems in Internet E-mail Provided by ITSC
 
Support Secure POP? Support Secure IMAP? No Yes Netscape 6 or above Yes Yes Outlook Express 5.0 or above No No Netscape 4.7 No No Eudora 5.1
 
 
 
 
Digital Certificates and keys
 
 
 
 
Weaknesses of digital keys
 
 
PGP
 
Mobile email security
 
 
 
 
Encryption
Digital Signature Public Key Private Key Public Key  can be distributed Private Key  should be secret PKI Public Key Infrustracture
Encryption
Certification
None Secure Model Bob John Hacker Receiving  changing Re-sending
Secure Model Bob Hacker John
A Signed by His Private Key B  C  D  E  F Encrypted by B,C,D,F Public  Key
Server
ISP Yahoo  login page Client DNS server Router Yahoo  mail server
Yahoo  fake login page ISP Client DNS server Router Yahoo  mail server Yahoo  fake server
Data Exchanging User name : -- Password : --- Catch user Confidential  Information  User name : administrator Password : =44gtfDs43 Can affect information  ,[object Object],[object Object],None Secure Model Client Server Sniffer Can see the screen http  session pocket
Data Exchanging Secure Model Can not read data because  he doesn’t have the server’s  private key . Client Sniffer https  session pocket Server
مواردی که در زمان ورود کاربر به يک شبکه امن مورد بررسي قرار مي گيرد  . معتبر بودن صادر کننده  گواهينامه درصورتيکه صادر کننده گواهينامه معتبر نباشد پيام خطا نمايش داده ميشود تاريخ اعتبار  در صورت گذشتن از  زمان تاريخ اعتبار  گواهينامه عدم اعتبار آن به کاربر اعلام ميشود استفاده کننده  نام سايت استفاده کننده بايستی با نام مندرج در گواهينامه يکسان باشد  در غير اينصورت پيغام  خطا داده مي شود
 
 

Contenu connexe

En vedette

All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithmSrikrishnan Suresh
 
Longest Common Subsequence (LCS) Algorithm
Longest Common Subsequence (LCS) AlgorithmLongest Common Subsequence (LCS) Algorithm
Longest Common Subsequence (LCS) AlgorithmDarshit Metaliya
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?NeoCertified
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 

En vedette (6)

All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
 
Longest Common Subsequence (LCS) Algorithm
Longest Common Subsequence (LCS) AlgorithmLongest Common Subsequence (LCS) Algorithm
Longest Common Subsequence (LCS) Algorithm
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?
 
Pgp smime
Pgp smimePgp smime
Pgp smime
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 

Similaire à Email Security

E commerce security(without animation)
E commerce security(without animation)E commerce security(without animation)
E commerce security(without animation)mmousavi
 
E Commerce Security
E Commerce SecurityE Commerce Security
E Commerce Securitymdasgar
 
Security in internet shopping
Security in internet shoppingSecurity in internet shopping
Security in internet shoppingfarnazkhosronia
 
Security in internet shopping
Security in internet shoppingSecurity in internet shopping
Security in internet shoppingfarzaneh1234
 
security in internet shopping
security in internet shoppingsecurity in internet shopping
security in internet shoppingfarzaneh1234
 
Aliakbarhassanpour securityproject
Aliakbarhassanpour securityprojectAliakbarhassanpour securityproject
Aliakbarhassanpour securityprojectit88tabriz
 
HTTPS نحوه کارکرد پروتکل
HTTPS نحوه کارکرد پروتکلHTTPS نحوه کارکرد پروتکل
HTTPS نحوه کارکرد پروتکلHossein Zahed
 
Mitm iran
Mitm iranMitm iran
Mitm irankalpase
 
Security in eCommerce | Payment security
Security in eCommerce | Payment securitySecurity in eCommerce | Payment security
Security in eCommerce | Payment securityMahdi Yousefi
 

Similaire à Email Security (12)

E commerce security(without animation)
E commerce security(without animation)E commerce security(without animation)
E commerce security(without animation)
 
E Commerce Security
E Commerce SecurityE Commerce Security
E Commerce Security
 
Default
DefaultDefault
Default
 
Ssl security
Ssl securitySsl security
Ssl security
 
Security in internet shopping
Security in internet shoppingSecurity in internet shopping
Security in internet shopping
 
Security in internet shopping
Security in internet shoppingSecurity in internet shopping
Security in internet shopping
 
security in internet shopping
security in internet shoppingsecurity in internet shopping
security in internet shopping
 
Aliakbarhassanpour securityproject
Aliakbarhassanpour securityprojectAliakbarhassanpour securityproject
Aliakbarhassanpour securityproject
 
HTTPS نحوه کارکرد پروتکل
HTTPS نحوه کارکرد پروتکلHTTPS نحوه کارکرد پروتکل
HTTPS نحوه کارکرد پروتکل
 
Mitm iran
Mitm iranMitm iran
Mitm iran
 
بکتوری
بکتوریبکتوری
بکتوری
 
Security in eCommerce | Payment security
Security in eCommerce | Payment securitySecurity in eCommerce | Payment security
Security in eCommerce | Payment security
 

Email Security