SlideShare a Scribd company logo
Email Security & Threads,
PGP related Concepts
Presented by:
Areeba Riaz Abdul Manan
Muhammad Junaid Allah Ditta
Email Security
 it refers to secure the access and content of an email account or
service.
 multiple techniques used to secure an email service. From an
individual/end user standpoint, proactive email security measures
include:
 Strong passwords
 Password rotations
 Spam filters
 Desktop-based anti-virus/anti-spam applications
 a service provider ensures email security by
 Access control mechanisms on an email serve
 Encrypting
 firewall and software-based spam filtering
Threats
a person or thing likely to cause damage or danger.
Threats to the security of e-mail itself
Loss of confidentiality
E-mails are sent in clear over open networks
E-mails stored on potentially insecure clients and mail servers
Loss of integrity
No integrity protection on e-mails; body can be altered in transit or on mail
server
Lack of data origin authentication
Lack of non-repudiation
nonrepudiation refers to the ability to ensure that a party to a contract or a
communication cannot deny the authenticity of their signature on a
document or the sending of a message that they originated.
Lack of notification of receipt
Threats Enabled by E-mail
Disclosure of sensitive information
Exposure of systems to malicious code
Denial-of-Service (DoS)
Unauthorized accesses etc
Email Security Threats
Snowshoe spamming
Hacktivism
Data Breach
Snowshoe spamming
 Spam is irrelevant messages sent over the Internet, typically to
large numbers of users, for the purposes of advertising, spreading
malware etc.
 Snowshoe spamming is a spamming technique in which the
spammer uses a wide array of IP addresses in order to spread out
the spam load.
 The large spread of IP addresses makes it difficult to identify and
trap the spam, allowing at least some of it to reach email inboxes.
For companies which specialize in trapping spam, snowshoe
spamming is particularly noxious because it is difficult to trap it with
traditional spam filters.
Hacktivism
 Hacktivism is the act of hacking, or breaking into a computer
system, for a politically or socially motivated purpose. The
individual who performs an act of hacktivism is said to be a
hacktivist.
 A hacktivist uses the same tools and techniques as a hacker,
but does so in order to disrupt services and bring attention to
a political or social cause.
 For example, one might leave a highly visible message on the
home page of a Web site that gets a lot of traffic or which
embodies a point-of-view that is being opposed. Or one
might launch a denial-of-service attack to disrupt traffic to a
particular site.
Data Breach
 A data breach is an incident in which sensitive, protected or
confidential data has potentially been viewed, stolen or used
by an individual unauthorized to do so.
 Data breaches may involve personal health information
(PHI), personally identifiable information (PII), trade secrets or
intellectual property.
Email based Attacks
Active content attack
Buffer over-flow attack
Trojan Horse Attack
Web bugs
Active content attack
 which take advantage of various active HTML and scripting
features and bugs.
 a.k.a.(also known as) Browser Attacks, Active HTML Attacks or
Scripting Attacks.
 these attacks attempt to use the scripting features of HTML or
of the email client (typically Javascript or VBScript).
 Purpose is to retrieve private information from the victim's
computer or to execute code on the victim's computer
without the victim's permission (and possibly without the
victim's knowledge).
Buffer Overflow Attack
 A buffer is a sequential section of memory allocated to contain
anything from a character string to an array of integers.
 A buffer overflow, or “buffer overrun” occurs when more data is
put into a fixed-length buffer than the buffer can handle.
 Adjacent memory space becomes overwritten and corrupted.
 When this occurs – bad things happen. Usually system crashes,
but also the opportunity for an attacker to run arbitrary code.
 arbitrary code execution is used to describe an attacker's ability to
execute any commands of the attacker's choice on a target machine or
in a target process.
Trojan Horse Attack
 A Trojan horse is a program in which malicious or harmful code is
contained inside having harmful programming or data in such a
way that it can get control and do its chosen form of damage,
such as ruining the file allocation table on your hard disk.
 for example, by installing remote-access back door software.
 For this attack to succeed the victim must take action to run the
program that they've received. The attacker can use various
"social engineering" methods to convince the victim to run the
program.
 Windows' default configuration is to hide filename extensions from
the user, so in a directory listing a file named textfile.txt will
appear as just "textfile.
Trojan Horse Attack
 An attacker can take advantage of this combination of
things by sending an attachment named "attack.txt.exe" -
Windows will helpfully hide the .exe extension, making the
attachment appear to be a benign text file named
"attack.txt" instead of a program. However, if the user
forgets that Windows is hiding the actual filename extension
and double-clicks on the attachment, Windows will use the
full filename to decide what to do, and since .exe indicates
an executable program, Windows runs the attachment.
Web Bug
 A Web bug, also known as a Web beacon, is a file object
that is placed on a Web page or in an e-mail message to
monitor user behavior.
 A Web beacon is an often-transparent graphic image,
usually no larger than 1 pixel x 1 pixel, that is placed on a
Web site or in an email that is used to monitor the behavior
of the user visiting the Web site or sending the email. It is
often used in combination with cookies.
Web Bug
a Web bug can gather the following statistics:
 The IP address of the computer that fetched the Web bug.
 The URL of the page that the Web bug is located on.
 The URL of the Web bug.
 The time the Web bug was viewed.
 The type of browser that fetched the Web bug.
 A previously set cookie value.
PGP
 Pretty Good Privacy (PGP) is a data encryption and
decryption computer program that
provides cryptographic privacy and authentication for data
communication.
 Developed by Phil Zimmerman in 1995.
 Used for encrypting, and decrypting texts, e-mails, files,
directories, and whole disk partitions and to increase the
security of e-mail communications.
Keys
 Two types
 Public key
 Private key
 The Public Key is what its name suggests - Public. It is made
available to everyone via a publicly.
 the Private Key must remain confidential to its respective
owner.
Example
 if Bob wants to send sensitive data to Alice, and wants to be sure
that only Alice may be able to read it, he will encrypt the data with
Alice's Public Key. Only Alice has access to her corresponding
Private Key and as a result is the only person with the capability of
decrypting the encrypted data back into its original form.
 As only Alice has access to her Private Key, it is possible that only
Alice can decrypt the encrypted data. Even if someone else gains
access to the encrypted data, it will remain confidential as they
should not have access to Alice's Private Key.
Email security & threads

More Related Content

What's hot

Email security
Email securityEmail security
Email security
SultanErbo
 
Password Management
Password ManagementPassword Management
Password Management
Rick Chin
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
Neha Bhambu
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
Salman Memon
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
Sanjiv Arora
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
Jagan Mohan
 
HACKING
HACKINGHACKING
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Damien Magoni
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
Security testing
Security testingSecurity testing
Security testing
Khizra Sammad
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
ABHAY PATHAK
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
Sina Manavi
 

What's hot (20)

Email security
Email securityEmail security
Email security
 
Password Management
Password ManagementPassword Management
Password Management
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Cryptography
CryptographyCryptography
Cryptography
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
HACKING
HACKINGHACKING
HACKING
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Application Security
Application SecurityApplication Security
Application Security
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Security testing
Security testingSecurity testing
Security testing
 
Cryptography
CryptographyCryptography
Cryptography
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 

Similar to Email security & threads

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Network security
Network securityNetwork security
Network security
Md. Asifur Rahman Siddiki
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossarythinkict
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
Cyber security professional services- Detox techno
 
Network security
Network securityNetwork security
Network security
nafisarayhana1
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
Stephanie Williams
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
Hafiza Abas
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
Manoj VNV
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
CSEA18Arun537
 
8.Information Security
8.Information Security8.Information Security
8.Information Security
Export Promotion Bureau
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
JIJO CLEETUS
 

Similar to Email security & threads (20)

Eseminar1
Eseminar1Eseminar1
Eseminar1
 
email security
email securityemail security
email security
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Itc chapter # 11
 
Network security
Network securityNetwork security
Network security
 
Security communication
Security communicationSecurity communication
Security communication
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
 
Network security
Network securityNetwork security
Network security
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
8.Information Security
8.Information Security8.Information Security
8.Information Security
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 

More from Inocentshuja Ahmad

Bottom up parser
Bottom up parserBottom up parser
Bottom up parser
Inocentshuja Ahmad
 
7th lec overview - latest
7th lec   overview - latest7th lec   overview - latest
7th lec overview - latest
Inocentshuja Ahmad
 
6th lec infrared slides
6th lec   infrared slides6th lec   infrared slides
6th lec infrared slides
Inocentshuja Ahmad
 
5th lec ofdm
5th lec   ofdm5th lec   ofdm
5th lec ofdm
Inocentshuja Ahmad
 
3rd lec fcss
3rd lec   fcss3rd lec   fcss
3rd lec fcss
Inocentshuja Ahmad
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
Inocentshuja Ahmad
 
1st lec generations
1st lec   generations1st lec   generations
1st lec generations
Inocentshuja Ahmad
 
4rth lec dsss
4rth lec   dsss4rth lec   dsss
4rth lec dsss
Inocentshuja Ahmad
 
Mcq's
Mcq'sMcq's
Long questions
Long questionsLong questions
Long questions
Inocentshuja Ahmad
 
Lecture notes on mobile communication
Lecture notes on mobile communicationLecture notes on mobile communication
Lecture notes on mobile communication
Inocentshuja Ahmad
 
Gsm
GsmGsm
Lecture5 mobile communication_short
Lecture5 mobile communication_short Lecture5 mobile communication_short
Lecture5 mobile communication_short
Inocentshuja Ahmad
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
Inocentshuja Ahmad
 
Chapter 10:Risk and Refinements In Capital Budgeting
Chapter 10:Risk and Refinements In Capital BudgetingChapter 10:Risk and Refinements In Capital Budgeting
Chapter 10:Risk and Refinements In Capital Budgeting
Inocentshuja Ahmad
 
Chapter 9:Capital Budgeting Techniques
Chapter 9:Capital Budgeting TechniquesChapter 9:Capital Budgeting Techniques
Chapter 9:Capital Budgeting Techniques
Inocentshuja Ahmad
 
Chapter 5:Risk and Return
Chapter 5:Risk and ReturnChapter 5:Risk and Return
Chapter 5:Risk and Return
Inocentshuja Ahmad
 
Question and answer Programming
Question and answer ProgrammingQuestion and answer Programming
Question and answer Programming
Inocentshuja Ahmad
 
Chapter03 Top Down Design with Function
Chapter03 Top Down Design with FunctionChapter03 Top Down Design with Function
Chapter03 Top Down Design with Function
Inocentshuja Ahmad
 
File System FAT And NTFS
File System FAT And NTFSFile System FAT And NTFS
File System FAT And NTFS
Inocentshuja Ahmad
 

More from Inocentshuja Ahmad (20)

Bottom up parser
Bottom up parserBottom up parser
Bottom up parser
 
7th lec overview - latest
7th lec   overview - latest7th lec   overview - latest
7th lec overview - latest
 
6th lec infrared slides
6th lec   infrared slides6th lec   infrared slides
6th lec infrared slides
 
5th lec ofdm
5th lec   ofdm5th lec   ofdm
5th lec ofdm
 
3rd lec fcss
3rd lec   fcss3rd lec   fcss
3rd lec fcss
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
1st lec generations
1st lec   generations1st lec   generations
1st lec generations
 
4rth lec dsss
4rth lec   dsss4rth lec   dsss
4rth lec dsss
 
Mcq's
Mcq'sMcq's
Mcq's
 
Long questions
Long questionsLong questions
Long questions
 
Lecture notes on mobile communication
Lecture notes on mobile communicationLecture notes on mobile communication
Lecture notes on mobile communication
 
Gsm
GsmGsm
Gsm
 
Lecture5 mobile communication_short
Lecture5 mobile communication_short Lecture5 mobile communication_short
Lecture5 mobile communication_short
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
 
Chapter 10:Risk and Refinements In Capital Budgeting
Chapter 10:Risk and Refinements In Capital BudgetingChapter 10:Risk and Refinements In Capital Budgeting
Chapter 10:Risk and Refinements In Capital Budgeting
 
Chapter 9:Capital Budgeting Techniques
Chapter 9:Capital Budgeting TechniquesChapter 9:Capital Budgeting Techniques
Chapter 9:Capital Budgeting Techniques
 
Chapter 5:Risk and Return
Chapter 5:Risk and ReturnChapter 5:Risk and Return
Chapter 5:Risk and Return
 
Question and answer Programming
Question and answer ProgrammingQuestion and answer Programming
Question and answer Programming
 
Chapter03 Top Down Design with Function
Chapter03 Top Down Design with FunctionChapter03 Top Down Design with Function
Chapter03 Top Down Design with Function
 
File System FAT And NTFS
File System FAT And NTFSFile System FAT And NTFS
File System FAT And NTFS
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Email security & threads

  • 1. Email Security & Threads, PGP related Concepts Presented by: Areeba Riaz Abdul Manan Muhammad Junaid Allah Ditta
  • 2. Email Security  it refers to secure the access and content of an email account or service.  multiple techniques used to secure an email service. From an individual/end user standpoint, proactive email security measures include:  Strong passwords  Password rotations  Spam filters  Desktop-based anti-virus/anti-spam applications  a service provider ensures email security by  Access control mechanisms on an email serve  Encrypting  firewall and software-based spam filtering
  • 3. Threats a person or thing likely to cause damage or danger. Threats to the security of e-mail itself Loss of confidentiality E-mails are sent in clear over open networks E-mails stored on potentially insecure clients and mail servers Loss of integrity No integrity protection on e-mails; body can be altered in transit or on mail server Lack of data origin authentication Lack of non-repudiation nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. Lack of notification of receipt
  • 4. Threats Enabled by E-mail Disclosure of sensitive information Exposure of systems to malicious code Denial-of-Service (DoS) Unauthorized accesses etc
  • 5. Email Security Threats Snowshoe spamming Hacktivism Data Breach
  • 6. Snowshoe spamming  Spam is irrelevant messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, spreading malware etc.  Snowshoe spamming is a spamming technique in which the spammer uses a wide array of IP addresses in order to spread out the spam load.  The large spread of IP addresses makes it difficult to identify and trap the spam, allowing at least some of it to reach email inboxes. For companies which specialize in trapping spam, snowshoe spamming is particularly noxious because it is difficult to trap it with traditional spam filters.
  • 7. Hacktivism  Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist.  A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.  For example, one might leave a highly visible message on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.
  • 8. Data Breach  A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so.  Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.
  • 9. Email based Attacks Active content attack Buffer over-flow attack Trojan Horse Attack Web bugs
  • 10. Active content attack  which take advantage of various active HTML and scripting features and bugs.  a.k.a.(also known as) Browser Attacks, Active HTML Attacks or Scripting Attacks.  these attacks attempt to use the scripting features of HTML or of the email client (typically Javascript or VBScript).  Purpose is to retrieve private information from the victim's computer or to execute code on the victim's computer without the victim's permission (and possibly without the victim's knowledge).
  • 11. Buffer Overflow Attack  A buffer is a sequential section of memory allocated to contain anything from a character string to an array of integers.  A buffer overflow, or “buffer overrun” occurs when more data is put into a fixed-length buffer than the buffer can handle.  Adjacent memory space becomes overwritten and corrupted.  When this occurs – bad things happen. Usually system crashes, but also the opportunity for an attacker to run arbitrary code.  arbitrary code execution is used to describe an attacker's ability to execute any commands of the attacker's choice on a target machine or in a target process.
  • 12. Trojan Horse Attack  A Trojan horse is a program in which malicious or harmful code is contained inside having harmful programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.  for example, by installing remote-access back door software.  For this attack to succeed the victim must take action to run the program that they've received. The attacker can use various "social engineering" methods to convince the victim to run the program.  Windows' default configuration is to hide filename extensions from the user, so in a directory listing a file named textfile.txt will appear as just "textfile.
  • 13. Trojan Horse Attack  An attacker can take advantage of this combination of things by sending an attachment named "attack.txt.exe" - Windows will helpfully hide the .exe extension, making the attachment appear to be a benign text file named "attack.txt" instead of a program. However, if the user forgets that Windows is hiding the actual filename extension and double-clicks on the attachment, Windows will use the full filename to decide what to do, and since .exe indicates an executable program, Windows runs the attachment.
  • 14. Web Bug  A Web bug, also known as a Web beacon, is a file object that is placed on a Web page or in an e-mail message to monitor user behavior.  A Web beacon is an often-transparent graphic image, usually no larger than 1 pixel x 1 pixel, that is placed on a Web site or in an email that is used to monitor the behavior of the user visiting the Web site or sending the email. It is often used in combination with cookies.
  • 15. Web Bug a Web bug can gather the following statistics:  The IP address of the computer that fetched the Web bug.  The URL of the page that the Web bug is located on.  The URL of the Web bug.  The time the Web bug was viewed.  The type of browser that fetched the Web bug.  A previously set cookie value.
  • 16. PGP  Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication.  Developed by Phil Zimmerman in 1995.  Used for encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.
  • 17.
  • 18. Keys  Two types  Public key  Private key  The Public Key is what its name suggests - Public. It is made available to everyone via a publicly.  the Private Key must remain confidential to its respective owner.
  • 19. Example  if Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice's Public Key. Only Alice has access to her corresponding Private Key and as a result is the only person with the capability of decrypting the encrypted data back into its original form.  As only Alice has access to her Private Key, it is possible that only Alice can decrypt the encrypted data. Even if someone else gains access to the encrypted data, it will remain confidential as they should not have access to Alice's Private Key.