SlideShare a Scribd company logo
1 of 42
EMAIL SECURITY
SHIVA AYYADURAI
FIREWALL
Firewalls filter traffic and lower the risk that
malicious packets traveling over the network.
WHAT YOU CAN DO WITH FIREWALL
1) Web Filtering
2) Bandwidth Filtering
3) Logging Information
4) In Built DHCP Server
5) VPN etc.
SCREENSHOTS OF OUR COLLEGE
FIREWALL
SCREENSHOTS OF OUR COLLEGE
FIREWALL
SCREENSHOTS OF OUR COLLEGE
FIREWALL
ACL
It stands for Access Control List.
An ACL has separate inbound and outbound
rules, and each rule can either allow or deny
traffic.
EAMPLE OF ACL
User : Student
Site : Youtube.com
Source: LAN
Destination: WAN
Network: Any
Allow or Deny
TCP CONNECTION ESTABLISHMENT
(OR) 3 WAY HANDSHAKE
It is defined as whenever a computer is about to
communicate with any foreign device ( Server,
modem etc) it needs to handshake (or) to
establish a connection with it.
In 3 way handshake SYNC, SYNC+ACK and ACK
are used.
In 2 way handshake FIN and ACK are used.
TCP CONNECTION TERMINATION
DNS
DNS stands for Domain Name Service which
converts Domain Names into IP Address.
(Ex) Analogy of Telephone Book
Rules for Domain Name
1) Each Label (i.e.) Domain Name (.com, .edu,
.in) should not exceed 63 Characters.
2) The full domain name should not exceed 253
Characters (www.twitter.com)
3) The Domain Names are Case Independent
one (It can either Upper Case (or) Lower Case
Letters).
Rules for Domain Name
4) The Domain Name can be Letters, Digits,
Hyphen (www.kcet123-vnr.org). This is called
LDH Rule.
World famous registers for Domain
Names
1) GoDaddy.com
2) Name cheap.com
3) 1&1 Internet.com
4) Dotster.com
ICMP
Stands for "Internet Control Message Protocol“
If there is a problem with the Internet
connection, error and status messages
regarding the connection are sent using ICMP
COMMON ERROR MESSAGES
COMMON ERROR MESSAGES
COMMON ERROR MESSAGES
COMMON ERROR MESSAGES
PORT NUMBER
A port number is to uniquely identify a specific
process or application in the network.
Types of Port Number
1) Ephemeral Port Number
2) Reserved Port Number
RANKING OF EMAIL
STRUCTURE OF EMAIL
STRUCTURE OF EMAIL
It consists of the following parts such as
1) Header
2) Body
3) To,cc (Carbon Copy), bcc (Blind Carbon Copy)
ABOUT SMTP
It stands for Simple Mail Transfer Protocol.
It is used to transfer email from one user to
another.
OPERATION OF SMTP
LIMITATION OF SMTP
1) SMTP Cannot transmit executable files.
2) SMTP Cannot transmit data in their national
languages (i.e. we can’t send mail in Hindi or
tamil).
3) SMTP rejects message when it exceed the
certain size.
4) It doesn’t supports any animation in their
signature (or) in the body part.
MIME
It stands for Multi Purpose Internet Mail Extension.
It supports Non-text attachments such as audio,
video, images, application programs (apk) etc.
Header and Body information in their national
language itself.
It supports gif extension (or) It supports animation
in the body part.
MIME
POP
It stands for Post Office Protocol.
It is used to retrieve an e-mail from a
mail server.
Incoming messages are stored at a
POP server until the user logs in and view the
message.
DISADVANTAGES OF POP
1) It does not POP supports flags on the server
to keep track of message state:
(Ex) whether the message has been read or not,
replied to, or deleted.
2) With POP, no synchronize among multiple
devices. (Ex) Viewing in PC, Tab etc.
SYNCHRONISATION IS NOT POSSIBLE
IN POP
IMAP
It stands for Internet Message Access Protocol
(IMAP) for accessing email on a remote server
from a local client.
SYNCHRONISATION IS POSSIBLE IN
IMAP
SYNCHRONISATION IS POSSIBLE IN
IMAP
TLS
TLS
Transport Layer Security (TLS) is a protocol that
provides privacy and data integrity between
two communicating applications.
When a server and client communicate, TLS
protocol ensures that no third party may
eavesdrop, tamper with any message, and
message forgery.
TLS
TLS

More Related Content

What's hot

Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
Hasam Panezai
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
Priyanka Shinde
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Rajan Pandey
 

What's hot (20)

E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
Chapter3
Chapter3Chapter3
Chapter3
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
Application layer
Application layerApplication layer
Application layer
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application layer
Application layerApplication layer
Application layer
 
E mail flow
E mail flowE mail flow
E mail flow
 
Email
EmailEmail
Email
 
Application layer
Application layerApplication layer
Application layer
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 

Similar to Email security

Similar to Email security (20)

Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02
 
Chat app case study - xmpp vs SIP
Chat app case study - xmpp vs SIPChat app case study - xmpp vs SIP
Chat app case study - xmpp vs SIP
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Network Protocols KS4
Network Protocols KS4Network Protocols KS4
Network Protocols KS4
 
CN
CNCN
CN
 
Osi
OsiOsi
Osi
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
application layer
application layerapplication layer
application layer
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Avani
AvaniAvani
Avani
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 

More from KABILESH RAMAR (20)

Online i os
Online i osOnline i os
Online i os
 
Linux and windows
Linux and windowsLinux and windows
Linux and windows
 
Android os versions and architecture
Android os versions and architectureAndroid os versions and architecture
Android os versions and architecture
 
Turtle Graphics in CG
Turtle Graphics in CGTurtle Graphics in CG
Turtle Graphics in CG
 
Ray Tracing in Computer Graphics
Ray Tracing in Computer GraphicsRay Tracing in Computer Graphics
Ray Tracing in Computer Graphics
 
Visible surface detection methods
Visible surface detection methodsVisible surface detection methods
Visible surface detection methods
 
Raster scan and random scan
Raster scan and random scanRaster scan and random scan
Raster scan and random scan
 
Properties of light
Properties of lightProperties of light
Properties of light
 
Polygon mesh
Polygon meshPolygon mesh
Polygon mesh
 
Liquid crystal display
Liquid crystal displayLiquid crystal display
Liquid crystal display
 
Ink jet printer
Ink jet printerInk jet printer
Ink jet printer
 
Illumination models
Illumination modelsIllumination models
Illumination models
 
Dot matrix printers
Dot matrix printersDot matrix printers
Dot matrix printers
 
Cathode ray tubes
Cathode ray tubesCathode ray tubes
Cathode ray tubes
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
RFID
RFIDRFID
RFID
 
Digital libraries
Digital librariesDigital libraries
Digital libraries
 
Covert networks
Covert networksCovert networks
Covert networks
 
Ethernet
EthernetEthernet
Ethernet
 
Wi – fi ( 802.11)
Wi – fi ( 802.11)Wi – fi ( 802.11)
Wi – fi ( 802.11)
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

Email security

  • 3. FIREWALL Firewalls filter traffic and lower the risk that malicious packets traveling over the network.
  • 4. WHAT YOU CAN DO WITH FIREWALL 1) Web Filtering 2) Bandwidth Filtering 3) Logging Information 4) In Built DHCP Server 5) VPN etc.
  • 5. SCREENSHOTS OF OUR COLLEGE FIREWALL
  • 6. SCREENSHOTS OF OUR COLLEGE FIREWALL
  • 7. SCREENSHOTS OF OUR COLLEGE FIREWALL
  • 8. ACL It stands for Access Control List. An ACL has separate inbound and outbound rules, and each rule can either allow or deny traffic.
  • 9. EAMPLE OF ACL User : Student Site : Youtube.com Source: LAN Destination: WAN Network: Any Allow or Deny
  • 10. TCP CONNECTION ESTABLISHMENT (OR) 3 WAY HANDSHAKE It is defined as whenever a computer is about to communicate with any foreign device ( Server, modem etc) it needs to handshake (or) to establish a connection with it. In 3 way handshake SYNC, SYNC+ACK and ACK are used. In 2 way handshake FIN and ACK are used.
  • 11.
  • 13.
  • 14. DNS DNS stands for Domain Name Service which converts Domain Names into IP Address. (Ex) Analogy of Telephone Book
  • 15. Rules for Domain Name 1) Each Label (i.e.) Domain Name (.com, .edu, .in) should not exceed 63 Characters. 2) The full domain name should not exceed 253 Characters (www.twitter.com) 3) The Domain Names are Case Independent one (It can either Upper Case (or) Lower Case Letters).
  • 16. Rules for Domain Name 4) The Domain Name can be Letters, Digits, Hyphen (www.kcet123-vnr.org). This is called LDH Rule.
  • 17. World famous registers for Domain Names 1) GoDaddy.com 2) Name cheap.com 3) 1&1 Internet.com 4) Dotster.com
  • 18. ICMP Stands for "Internet Control Message Protocol“ If there is a problem with the Internet connection, error and status messages regarding the connection are sent using ICMP
  • 23. PORT NUMBER A port number is to uniquely identify a specific process or application in the network. Types of Port Number 1) Ephemeral Port Number 2) Reserved Port Number
  • 26. STRUCTURE OF EMAIL It consists of the following parts such as 1) Header 2) Body 3) To,cc (Carbon Copy), bcc (Blind Carbon Copy)
  • 27. ABOUT SMTP It stands for Simple Mail Transfer Protocol. It is used to transfer email from one user to another.
  • 29. LIMITATION OF SMTP 1) SMTP Cannot transmit executable files. 2) SMTP Cannot transmit data in their national languages (i.e. we can’t send mail in Hindi or tamil). 3) SMTP rejects message when it exceed the certain size. 4) It doesn’t supports any animation in their signature (or) in the body part.
  • 30. MIME It stands for Multi Purpose Internet Mail Extension. It supports Non-text attachments such as audio, video, images, application programs (apk) etc. Header and Body information in their national language itself. It supports gif extension (or) It supports animation in the body part.
  • 31. MIME
  • 32. POP It stands for Post Office Protocol. It is used to retrieve an e-mail from a mail server. Incoming messages are stored at a POP server until the user logs in and view the message.
  • 33. DISADVANTAGES OF POP 1) It does not POP supports flags on the server to keep track of message state: (Ex) whether the message has been read or not, replied to, or deleted. 2) With POP, no synchronize among multiple devices. (Ex) Viewing in PC, Tab etc.
  • 34. SYNCHRONISATION IS NOT POSSIBLE IN POP
  • 35. IMAP It stands for Internet Message Access Protocol (IMAP) for accessing email on a remote server from a local client.
  • 38.
  • 39. TLS
  • 40. TLS Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications. When a server and client communicate, TLS protocol ensures that no third party may eavesdrop, tamper with any message, and message forgery.
  • 41. TLS
  • 42. TLS