SlideShare a Scribd company logo
1 of 16
Implementation of secure mail server
       in cloud environment



       Advanced Network Security
            Dr.Azizol Abdullah
Team Work


Nadim K. Madi
Solmaz Salehian
Farzaneh Masoumiyan
Abdulraqeb Abdullah
Outlines


I n    t   r   o   d   u   c t   i on
 me    t   h   o   d   o   l o   gy
 Mi    g   r   a   t   i   ng     t o c l oud
  e n   v   i   r   o   n   me    nt
Co     n   c   l   u   s   i o   n?
Mail transfer agent


      MTA




    Postfix


 Transport Layer
 Security(TLS)        Secure Mail server
       &
  SMTP-AUTH
Introduction
Postfix security
 Transport Layer Security (TLS) : make privacy by using
  symmetric cryptography and a keyed message authentication
  code message reliability.

 SMTP-AUTH : which use Simple Authentication and Security
  Layer (SASL) Internet Standard method which can be used with
  protocols such as SMTP for adding authentication support to
  connection-based protocols .

Main aim of using postfix
 significant impact on Internet mail performance and security
Methodology
Linux-based platform has been configured as a server with
   postfix and covers TLS and SMTP_AUTH.

Implementation Steps:
 Installation (postfix)
 Configuration
    Authentication (SMTP_AUTH)
   Digital Certificates
   Encryption
 Testing
Installation
configuration
Authentication
Testing
Testing
Testing
Migrating to cloud environment


• Cloud-Based Email Services:
   – cheaper than running personal email service on-premise.
   – rapidly provision new users. More scalable.
   – Always run the latest software and configurations without upgrade
     hassles.
   – Shift the financial burden from upfront capital expense to ongoing
     operating expense.
Migrating to cloud environment cont ...

7. perform backups new cloud-based email service


6. start using cloud based-email solution


5. Assign the registered domains to several DNS records
                                                            Cloud-
4. forward email from old server to new cloud mailbox     Based Email
                                                            Service

3. create a profile to remember all email accounts


2. setup new users, storage, aliases, and SharePoint

1. new host can import emails from the current one
Conclusion
• A mail server has been configured and tested in Linux
  environment using postfix Email Transfer Agent to
  “send, receive, and deliver” emails.
• The main aim what is ensuring a security level has also been
  achieved using TLS Security Certificates. Also authentication
  mechanism is supported using SMTP-AUTH.
• This implementation can be migrated to cloud-based
  level, over 7 phases to ensure end-to-end functions adaption.
• A further digging for enhancement might be applied in the
  mail transfer agent part. As well as the concept of
  heterogeneity.
,  ,




Thank You for Your Attention

           Q&A

More Related Content

Viewers also liked

Presentation1.Ppt Email And Internet
Presentation1.Ppt Email And InternetPresentation1.Ppt Email And Internet
Presentation1.Ppt Email And Internet
aggregate
 
All about email
All about emailAll about email
All about email
estefana4
 
Email ppt
Email pptEmail ppt
Email ppt
melgade
 

Viewers also liked (10)

How Email Works
How Email WorksHow Email Works
How Email Works
 
how email works
how email workshow email works
how email works
 
Presentation1.Ppt Email And Internet
Presentation1.Ppt Email And InternetPresentation1.Ppt Email And Internet
Presentation1.Ppt Email And Internet
 
All about email
All about emailAll about email
All about email
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
Email ppt
Email pptEmail ppt
Email ppt
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Similar to Implementation of secure email server in cloud environment copy1

Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overview
rsnarayanan
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
deanmtaylor1545
 
10135 a 06
10135 a 0610135 a 06
10135 a 06
Bố Su
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Private Cloud
 

Similar to Implementation of secure email server in cloud environment copy1 (20)

Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Final
 
SkyConnect
SkyConnectSkyConnect
SkyConnect
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overview
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
SSO with kerberos
SSO with kerberosSSO with kerberos
SSO with kerberos
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gateway
 
CloudMail Slick
CloudMail SlickCloudMail Slick
CloudMail Slick
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Lab08Email
Lab08EmailLab08Email
Lab08Email
 
TechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 OverviewTechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 Overview
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?
 
CensorNet MailSafe
CensorNet MailSafeCensorNet MailSafe
CensorNet MailSafe
 
Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
 
10135 a 06
10135 a 0610135 a 06
10135 a 06
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Implementation of secure email server in cloud environment copy1

  • 1. Implementation of secure mail server in cloud environment Advanced Network Security Dr.Azizol Abdullah
  • 2. Team Work Nadim K. Madi Solmaz Salehian Farzaneh Masoumiyan Abdulraqeb Abdullah
  • 3. Outlines I n t r o d u c t i on  me t h o d o l o gy  Mi g r a t i ng t o c l oud e n v i r o n me nt Co n c l u s i o n?
  • 4. Mail transfer agent MTA Postfix Transport Layer Security(TLS) Secure Mail server & SMTP-AUTH
  • 5. Introduction Postfix security  Transport Layer Security (TLS) : make privacy by using symmetric cryptography and a keyed message authentication code message reliability.  SMTP-AUTH : which use Simple Authentication and Security Layer (SASL) Internet Standard method which can be used with protocols such as SMTP for adding authentication support to connection-based protocols . Main aim of using postfix  significant impact on Internet mail performance and security
  • 6. Methodology Linux-based platform has been configured as a server with postfix and covers TLS and SMTP_AUTH. Implementation Steps:  Installation (postfix)  Configuration Authentication (SMTP_AUTH) Digital Certificates Encryption  Testing
  • 13. Migrating to cloud environment • Cloud-Based Email Services: – cheaper than running personal email service on-premise. – rapidly provision new users. More scalable. – Always run the latest software and configurations without upgrade hassles. – Shift the financial burden from upfront capital expense to ongoing operating expense.
  • 14. Migrating to cloud environment cont ... 7. perform backups new cloud-based email service 6. start using cloud based-email solution 5. Assign the registered domains to several DNS records Cloud- 4. forward email from old server to new cloud mailbox Based Email Service 3. create a profile to remember all email accounts 2. setup new users, storage, aliases, and SharePoint 1. new host can import emails from the current one
  • 15. Conclusion • A mail server has been configured and tested in Linux environment using postfix Email Transfer Agent to “send, receive, and deliver” emails. • The main aim what is ensuring a security level has also been achieved using TLS Security Certificates. Also authentication mechanism is supported using SMTP-AUTH. • This implementation can be migrated to cloud-based level, over 7 phases to ensure end-to-end functions adaption. • A further digging for enhancement might be applied in the mail transfer agent part. As well as the concept of heterogeneity.
  • 16. ,  , Thank You for Your Attention Q&A

Editor's Notes

  1. 2nd: … between local-based mail system and cloud-based mail system.3rd: to handle more multiple process concurrently. Combining several platforms together.