By- Richa Gulati
Roll No.-08EMTCS092
Secure Mail Server
• An application that Sends & receives incoming E-
mail from Internet users.
• Location is not Fixed.
• Why it so Popular ...
Structure of Mail Server
• System uses following protocols for sending e-mail:
1. SMTP -Simple Mail Transfer Protocol
2. E...
Working of Mail Server
Security Problems
• Some Other Person can Use your account by Hacking.
• You may login to fake Web-site
Eg. https://www.ci...
Reasons Behind Security
Problem
• If the connection to your Webmail server is “insecure” (i.e. the
address is http:// and ...
Role of POP & IMAP
• POP and IMAP: The POP and IMAP protocols require that you
send your username and password to login; t...
Solutions to problem
1. Symmetric Encryption
In symmetric encryption, you and your friend share a “secret”
key. Using this...
In asymmetric key
encryption
• In asymmetric key encryption, the two keys that each person
possesses are commonly named th...
Securing Your Email With
SSL or TLSSSL is a combination of asymmetric and symmetric key encryption
mechanisms.
What is spam?
• flooding the Internet with many copies of the same message, in an attempt
to force the message on people w...
Span Filters
Filtering by header
Filtering by body content
Filtering by attachment
How to make digital certificate
THANKYOU!!!
QUERIES???
Print master
• Your Text here
• Lorem ipsum dolor sit amet, consectetuer
adipiscing elit, sed diam nonummy nibh euismod
ti...
Upcoming SlideShare
Loading in...5
×

Secure mail server

420

Published on

how to make mail servers with help of redhat servers.

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total Views
420
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
57
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Secure mail server

  1. 1. By- Richa Gulati Roll No.-08EMTCS092 Secure Mail Server
  2. 2. • An application that Sends & receives incoming E- mail from Internet users. • Location is not Fixed. • Why it so Popular in Internet world? 1 . Very Fast 2. Keep The Data 3. Very Cheap 4. Able to send Attachment such as Audio and Video File What is Mail Server?
  3. 3. Structure of Mail Server • System uses following protocols for sending e-mail: 1. SMTP -Simple Mail Transfer Protocol 2. ESMTP -extended SMTP • And uses following protocols for receiving e-mail: 1. POP3(Post Office Protocol 3) 2. IMAP(Internet Message Access Protocol) for receiving e-mail.
  4. 4. Working of Mail Server
  5. 5. Security Problems • Some Other Person can Use your account by Hacking. • You may login to fake Web-site Eg. https://www.citybankindia.com • Path Hacking may be possible • Hacker may get access your user name & password via path Hacking.
  6. 6. Reasons Behind Security Problem • If the connection to your Webmail server is “insecure” (i.e. the address is http:// and NOT https://). • SMTP: Does not use TLS in SMTP.
  7. 7. Role of POP & IMAP • POP and IMAP: The POP and IMAP protocols require that you send your username and password to login; these credentials are not encrypted. So, your messages and credentials can be read by any eavesdropper listening to the flow of information between your personal computer and your email service provider’s computer.
  8. 8. Solutions to problem 1. Symmetric Encryption In symmetric encryption, you and your friend share a “secret” key. Using this key, you can encrypt a message into “cyphertext”.
  9. 9. In asymmetric key encryption • In asymmetric key encryption, the two keys that each person possesses are commonly named the “private” and “public” key.
  10. 10. Securing Your Email With SSL or TLSSSL is a combination of asymmetric and symmetric key encryption mechanisms.
  11. 11. What is spam? • flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get- rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender • Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. • In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.
  12. 12. Span Filters
  13. 13. Filtering by header
  14. 14. Filtering by body content
  15. 15. Filtering by attachment
  16. 16. How to make digital certificate
  17. 17. THANKYOU!!!
  18. 18. QUERIES???
  19. 19. Print master • Your Text here • Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. • Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×