Securing Emails

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

 Securing Emails:

E-mail is one of the most commonly used Internet services. Its infrastructure is a system of e-mail servers that use the Simple Mail Transfer Protocol (SMTP) to acquire messages from clients and to send those messages to other e-mail servers, and e-mail clients that use Post Office Protocol version 3 (POP3) or Internet Message Access Protocol (IMAP) to transmit and retrieve e-mail to and from the e-mail server. These protocols give us the efficiency we’ve become used to when sending and receiving email, however, they’re not secure and don’t have the adequate mechanisms to ensure confidentiality, integrity, and availability. There are methods to incorporate secure email messaging.

A security policy is a critical measure to sustain email security. The e-mail security policy must define acceptable use policies for e-mail, specifying the activities that can and cannot be performed over the organization’s e-mail infrastructure. This permits the transmission of work-focused messaging but curtails transmission of personal email. As well, illegal, immoral, or offensive content can be prohibited, and can include personal business e-mail.

Access control over e-mail will ensure that users have access to only their inbox and email archive databases.

The mechanisms and processes used to control the organizations’ e-mail infrastructure should be clarified.

End users don’t necessarily have …

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?