SlideShare a Scribd company logo
1 of 9
Email Security
Presented by
Salman Memon
2k12-IT-109
What is Email ?
• Electronic mail, most commonly called email or e-mail since
around 1993
• E-mail is one of the most widely used forms of communication
today.
• E-mail is faster and cheaper than traditional postal mail, but at
least when you seal that envelope and stick a stamp on it, you
can have some confidence that only the intended recipient
will open it.
• With e-mail, however, your message could be intercepted
midstream, and you might never realize it. You have to take
steps to secure and protect your e-mail messages.
What is Email Security ?
• Email security give the surety about secure email.
• Email security has become a hot topic in Information
Technology , but it can pose a number of security threats,
both with incoming and outgoing messages.
• Email security is a priority for all businesses, with the growing
threat of hackers, viruses spam, phishing and identity theft, as
well as the need to secure business information.
Email security cont..
• Email security is dealing with issues of unauthorized access
and inspection of electronic mail. This unauthorized access
can happen while an email is in transit, as well as when it is
stored on email servers or on a user computer.
• Email has to go through potentially untrusted intermediate
computers (email servers, ISPs) before reaching its
destination, and there is no way to tell if it was accessed by an
unauthorized entity.
WHAT DOESEMAILSECURITYINVOLVE?
• The three main principles of Information Security involve
• Maintaining the confidentiality,
• Integrity, and
• Availability of information resources.
• These three principles can be directly applied to the area of email
security as well.
• Confidentiality of email involves making sure it is protected from
unauthorized access
• Integrity of email involves a guarantee that it has not be modified or
destroyed by an unauthorized individual.
• Availability of email involves ensuring that mail servers remain
online and able to service the user community.
• A weakness in any one of these three key areas will undermine the
security posture of an email system and open the door to
exploitation.
How to secure Email
• Web browsers maintain a history of visited sites, and a cache
of browser data that help them load frequently visited pages
more quickly. The history and cache may also inadvertently
expose your e-mail messages. When you are done using your
Web mail, you can go into the settings for the browser and
clear out the cache.
• Better yet, use private browsing. The most popular Web
browsers--such as Internet Explorer, Firefox, and Chrome--
have an option to surf the Web using a private or anonymous
mode. When you use the private browsing mode, your entire
Web session is more secure, since no data is retained in the
history or cache
How to secure email cont..
• Privacy mode or "private browsing" or "incognito mode" is a
privacy feature in some web browsers to
disable browsing history and the web cache. This allows a
person to browse the Web without storing local data that
could be retrieved at a later date
WHAT ARE THE THREATS TO EMAIL
SECURITY?
• Viruses
• SPAM
• Clicking on links attached in Emails
• Open attachments if the sender is unidentified
THANK YOU

More Related Content

What's hot

E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
koolkampus
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
newsan2001
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 

What's hot (20)

Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Web Security
Web SecurityWeb Security
Web Security
 
Email security
Email securityEmail security
Email security
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Pgp
PgpPgp
Pgp
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 
Spam
SpamSpam
Spam
 
Network Security
Network SecurityNetwork Security
Network Security
 
Web security
Web securityWeb security
Web security
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
 

Similar to Email security - Netwroking

Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02
galaxy201
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
IJCSIS Research Publications
 
KNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTKNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENT
karanjae
 

Similar to Email security - Netwroking (20)

Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwroking
 
Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02
 
email bba s6.pptx
email bba s6.pptxemail bba s6.pptx
email bba s6.pptx
 
Email
EmailEmail
Email
 
Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquette
 
Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquette
 
E mail
E mailE mail
E mail
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | Seclore
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
KNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENTKNOWLEDGE MANAGEMENT
KNOWLEDGE MANAGEMENT
 
IT CLASS.pptx
IT CLASS.pptxIT CLASS.pptx
IT CLASS.pptx
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
 
IT PPT class 9.pptx
IT PPT class 9.pptxIT PPT class 9.pptx
IT PPT class 9.pptx
 
Email
EmailEmail
Email
 

More from Salman Memon

More from Salman Memon (20)

PHP Array very Easy Demo
PHP Array very Easy DemoPHP Array very Easy Demo
PHP Array very Easy Demo
 
Complete Lecture on Css presentation
Complete Lecture on Css presentation Complete Lecture on Css presentation
Complete Lecture on Css presentation
 
How to Use Dreamweaver cs6
How to Use Dreamweaver cs6 How to Use Dreamweaver cs6
How to Use Dreamweaver cs6
 
what is programming and its clear Concepts to the point
what is programming and its clear Concepts to the point what is programming and its clear Concepts to the point
what is programming and its clear Concepts to the point
 
Working with variables in PHP
Working with variables in PHPWorking with variables in PHP
Working with variables in PHP
 
Web forms and html (lect 5)
Web forms and html (lect 5)Web forms and html (lect 5)
Web forms and html (lect 5)
 
Web forms and html (lect 4)
Web forms and html (lect 4)Web forms and html (lect 4)
Web forms and html (lect 4)
 
Web forms and html (lect 3)
Web forms and html (lect 3)Web forms and html (lect 3)
Web forms and html (lect 3)
 
Web forms and html (lect 2)
Web forms and html (lect 2)Web forms and html (lect 2)
Web forms and html (lect 2)
 
Web forms and html (lect 1)
Web forms and html (lect 1)Web forms and html (lect 1)
Web forms and html (lect 1)
 
Managing in the Future Enterprise
Managing in the Future EnterpriseManaging in the Future Enterprise
Managing in the Future Enterprise
 
Overview of Technology Management
Overview of Technology ManagementOverview of Technology Management
Overview of Technology Management
 
Align Information Technology and Business Strategy
Align Information Technology and Business Strategy Align Information Technology and Business Strategy
Align Information Technology and Business Strategy
 
WHITE BOX & BLACK BOX TESTING IN DATABASE
WHITE BOX & BLACK BOXTESTING IN DATABASEWHITE BOX & BLACK BOXTESTING IN DATABASE
WHITE BOX & BLACK BOX TESTING IN DATABASE
 
Query decomposition in data base
Query decomposition in data baseQuery decomposition in data base
Query decomposition in data base
 
Time Management
Time Management Time Management
Time Management
 
Multimedea device and routes
Multimedea device and routesMultimedea device and routes
Multimedea device and routes
 
Hash function
Hash function Hash function
Hash function
 
Data clustring
Data clustring Data clustring
Data clustring
 
Controlling User Access -Data base
Controlling User Access -Data baseControlling User Access -Data base
Controlling User Access -Data base
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Email security - Netwroking

  • 2. What is Email ? • Electronic mail, most commonly called email or e-mail since around 1993 • E-mail is one of the most widely used forms of communication today. • E-mail is faster and cheaper than traditional postal mail, but at least when you seal that envelope and stick a stamp on it, you can have some confidence that only the intended recipient will open it. • With e-mail, however, your message could be intercepted midstream, and you might never realize it. You have to take steps to secure and protect your e-mail messages.
  • 3. What is Email Security ? • Email security give the surety about secure email. • Email security has become a hot topic in Information Technology , but it can pose a number of security threats, both with incoming and outgoing messages. • Email security is a priority for all businesses, with the growing threat of hackers, viruses spam, phishing and identity theft, as well as the need to secure business information.
  • 4. Email security cont.. • Email security is dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. • Email has to go through potentially untrusted intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to tell if it was accessed by an unauthorized entity.
  • 5. WHAT DOESEMAILSECURITYINVOLVE? • The three main principles of Information Security involve • Maintaining the confidentiality, • Integrity, and • Availability of information resources. • These three principles can be directly applied to the area of email security as well. • Confidentiality of email involves making sure it is protected from unauthorized access • Integrity of email involves a guarantee that it has not be modified or destroyed by an unauthorized individual. • Availability of email involves ensuring that mail servers remain online and able to service the user community. • A weakness in any one of these three key areas will undermine the security posture of an email system and open the door to exploitation.
  • 6. How to secure Email • Web browsers maintain a history of visited sites, and a cache of browser data that help them load frequently visited pages more quickly. The history and cache may also inadvertently expose your e-mail messages. When you are done using your Web mail, you can go into the settings for the browser and clear out the cache. • Better yet, use private browsing. The most popular Web browsers--such as Internet Explorer, Firefox, and Chrome-- have an option to surf the Web using a private or anonymous mode. When you use the private browsing mode, your entire Web session is more secure, since no data is retained in the history or cache
  • 7. How to secure email cont.. • Privacy mode or "private browsing" or "incognito mode" is a privacy feature in some web browsers to disable browsing history and the web cache. This allows a person to browse the Web without storing local data that could be retrieved at a later date
  • 8. WHAT ARE THE THREATS TO EMAIL SECURITY? • Viruses • SPAM • Clicking on links attached in Emails • Open attachments if the sender is unidentified