SlideShare a Scribd company logo
1 of 24
Encrypting E-mail Messages
Introduction
According to case study 2 , All net solutions has a
different offices in several parts of new Zealand ,
they asked for help to create a different types of
email cryptography security options that can be
implemented , what problems this security facing
and best solutions for that and ease of use ,
including packages work with lotus notes ,Pegasus,
Microsoft outlook and Novell GroupWise, rank the
packages according to the criteria :are the easiest to
use and have the most features.
What is Encryption of Email Messages
Sometimes we want additional protection for our
e-mail communication to keep it from unwanted
eyes.
It is the process that protect the privacy of message
by converting it from plaintext(readable) into cipher
text (scrambled).
Only the recipient who has the private key that
matches the public key used to encrypt the
message can decipher the message for reading .
Any recipient without the corresponding private
key would see only garbled (change or alter) text.
Cryptography system used two keys
Public key: known to everyone
Private key :it is the secret key known only to the recipient
of the message.
Example sender wants to send secure message to recipient
,sender use the recipient’s public key to encrypt the message
, then recipient use the private key to decrypt it.
Other high-end encrypted email methods such as:
PGP
S/MIME
PGP
Pretty Good Privacy (PGP) is a data encryption and
decryption computer program that
provides cryptographic privacy and authentication for data
communication.
PGP is often used for signing, encrypting,
and decrypting texts, e-mails, files, directories, and whole
disk partitions and to increase the security of e-mail
communications.
S/MIME
S/MIME (Secure/Multipurpose Internet Mail Extensions) is
a widely accepted method, or more precisely a protocol, for
sending digitally signed and encrypted messages.
S/MIME allows you to encrypt emails and digitally sign
them.
When you use S/MIME with an email message, it helps the
people who receive that message to be certain that what
they see in their inbox is the exact message that started with
the sender.
Encryption email messages facing some challenging or
disadvantages:
Encryption Keys: Without a doubt, data encryption is a monumental
task for an IT specialist. The more data encryption keys there are the
more difficult IT administrative tasks for maintaining all of the keys can
be. If you lose the key to the encryption, you have lost the data
associated with it.
Expense: Data encryption can prove to be quite costly because the
systems that maintain data encryption must have capacity and
upgrades to perform such tasks. Without capable systems, the
reduction of systems operations can be significantly compromised.
 Unrealistic Requirements: If an organization does not understand
some of the restraints imposed by data encryption technology, it is
easy to set unrealistic standards and requirement which could
jeopardize data encryption security.
 Compatibility: Data encryption technology can be tricky when you
are layering it with existing programs and applications. This can
negatively impact routine operations within the system.
Advantages of encryption email messages
 Separation: Data encryption allows the data to remain
separate from the device security where it is stored.
Security is included with the encryption which permits
administrators to store and transmit data via unsecured
means.
 No Data Breaches: Data encryption circumvents the
potential complications that accompany data breaches
which provide ensured protection of intellectual property
and other similar types of data.
 Encryption Is On The Data: Because the encryption is on
the data itself, the data is secure regardless of how it is
transmitted. An exception to the rule can be transmission
tools such as email because sometimes a typical email
account does not provide the necessary security.
 Encryption Equals Confidentiality: A lot of organizations
are required to meet specific confidentiality
requirements and other associated regulations.
Encrypting data means that it can only be read by the
recipient who has the key to opening the data.
Email encryption messages that work with
Lotus notes
Pegasus
Microsoft outlook
Novell Groupwise
Lotus Notes
Security features
Public key infrastructure
 attenuation
 Encryption
Access control levels
Server , database
Document field
Strong reputation
Extremely few vulnerabilities.
Pegasus:
a powerful filtering system, so much so that it is possible to
run a fully automated client-based electronic mailing
list (including processing subscriptions, unsubscriptions
and forwards to moderation) using solely Pegasus Mail;
the ability to automatically select which email address to
send a reply from, based on the mail folder containing the
original received message;
the ability to include custom e-mail header lines (useful for
tracking emails, for example);
the ability to delete attachments without deleting the
message's text body, or to delete the HTML version of a
message while keeping the plain-text version, or vice versa,
saving disk space;
easy access to a message, including all headers, in raw form,
which is difficult or impossible in some other clients;
a "tree view" of the structure of a multipart message with all
its sections and attachments, giving access to view or save any
of the parts separately
support for downloading headers only, then deciding for each
message whether to download, delete, or leave for later
("Selective mail download"). It is possible to download a
message in full without deleting it from the server.
Microsoft outlook:
Outlook includes security features that allow you to send and
receive secure messages over the Internet. To accomplish this,
Outlook incorporates support for the Secure Multi-Purpose
Internet Messaging Extensions (S/MIME) protocol. Using this
standard enables you to send and receive signed or sealed
(encrypted) Internet e-mail.
This article describes how the following information:
 How to get a digital ID for sending secure messages.
 How to back up or copy a digital ID.
 How to move a digital ID to another computer.
 How to send a signed message.
 How to add a digital ID to your Contacts list.
 How to send an encrypted (sealed) message.
 How to sign or encrypt all messages that you send.
Novell GroupWise:
GroupWise is a messaging and collaboration platform
from Novell that supports email, calendaring, personal
information management, instant messaging, and
document management. The GroupWise platform
consists of desktop client software, which is available
for Windows, Mac OS X, and Linux, and the server
software, which is supported on Windows Server and
Linux.
The best email encryption software 2016 top
ten review
As a security level
HP Secure Mail
Pros
:
HP Secure Mail provides compliant email
communications, a wide range of hardware
compatibility and integration with most business
applications. It supports one-click and policy-based
email encryption and includes numerous reporting
options.
Cons
:
If you use Lotus Notes, you have to send inter-office
emails using the Lotus security option. HP Secure Mail
is not compatible with Android Honeycomb.
 Since there are many points both positive and negative to
consider, strategic planning for data encryption within an
organization is the key. Without detailed planning, data
encryption can easily become complex for the IT
administrator to manage and complicated for the end
users.
 organizations should hire professional secure email service
that easily overcomes the challenges of simplicity and
compatibility, offering the best value for your money.

 https://support.office.com/.../Encrypt-e-mail-messa
 searchsecurity.techtarget.com/definition/Pretty-Good-
Privacy
 https://en.wikipedia.org/wiki/S/MIME
 email-encryption-software-review.toptenreviews.com/
Encrypting E-mail Messages

More Related Content

What's hot

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Information security
Information securityInformation security
Information securityMustahid Ali
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Web Security
Web SecurityWeb Security
Web SecurityADIEFEH
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based EncryptionPratik Poddar
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!Speck&Tech
 
secure socket layer
secure socket layersecure socket layer
secure socket layerAmar Shah
 
Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network SecurityFahad Shaikh
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 

What's hot (20)

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Information security
Information securityInformation security
Information security
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Web Security
Web SecurityWeb Security
Web Security
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Network security
Network security Network security
Network security
 
Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
 
Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network Security
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Spamming
SpammingSpamming
Spamming
 

Similar to Encrypting E-mail Messages

apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayandreasschuster
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird iiBanukaVidusanka
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Email security
Email securityEmail security
Email securitykumarviji
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Private Cloud
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Temok IT Services
 
cryptography for home users
cryptography for home userscryptography for home users
cryptography for home usersRachanaS6
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Trend Micro - Hosted eMail Security
Trend Micro - Hosted eMail SecurityTrend Micro - Hosted eMail Security
Trend Micro - Hosted eMail SecurityTeddy Wijaya
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
Webinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingWebinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingVaultastic
 

Similar to Encrypting E-mail Messages (20)

apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gateway
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Eseminar1
Eseminar1Eseminar1
Eseminar1
 
email security
email securityemail security
email security
 
Email security
Email securityEmail security
Email security
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022
 
cryptography for home users
cryptography for home userscryptography for home users
cryptography for home users
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Nt1330 Unit 7
Nt1330 Unit 7Nt1330 Unit 7
Nt1330 Unit 7
 
Pgp
PgpPgp
Pgp
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
Trend Micro - Hosted eMail Security
Trend Micro - Hosted eMail SecurityTrend Micro - Hosted eMail Security
Trend Micro - Hosted eMail Security
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
Webinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingWebinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email Archiving
 

Recently uploaded

do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girlsshivangimorya083
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfpadillaangelina0023
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testspriyanshukumar97908
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...Suhani Kapoor
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一F La
 

Recently uploaded (20)

do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdf
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and tests
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
 

Encrypting E-mail Messages

  • 1. Encrypting E-mail Messages Introduction According to case study 2 , All net solutions has a different offices in several parts of new Zealand , they asked for help to create a different types of email cryptography security options that can be implemented , what problems this security facing and best solutions for that and ease of use , including packages work with lotus notes ,Pegasus, Microsoft outlook and Novell GroupWise, rank the packages according to the criteria :are the easiest to use and have the most features.
  • 2. What is Encryption of Email Messages Sometimes we want additional protection for our e-mail communication to keep it from unwanted eyes. It is the process that protect the privacy of message by converting it from plaintext(readable) into cipher text (scrambled). Only the recipient who has the private key that matches the public key used to encrypt the message can decipher the message for reading . Any recipient without the corresponding private key would see only garbled (change or alter) text.
  • 3.
  • 4. Cryptography system used two keys Public key: known to everyone Private key :it is the secret key known only to the recipient of the message. Example sender wants to send secure message to recipient ,sender use the recipient’s public key to encrypt the message , then recipient use the private key to decrypt it. Other high-end encrypted email methods such as: PGP S/MIME
  • 5. PGP Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.
  • 6.
  • 7. S/MIME S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted method, or more precisely a protocol, for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them. When you use S/MIME with an email message, it helps the people who receive that message to be certain that what they see in their inbox is the exact message that started with the sender.
  • 8.
  • 9. Encryption email messages facing some challenging or disadvantages: Encryption Keys: Without a doubt, data encryption is a monumental task for an IT specialist. The more data encryption keys there are the more difficult IT administrative tasks for maintaining all of the keys can be. If you lose the key to the encryption, you have lost the data associated with it. Expense: Data encryption can prove to be quite costly because the systems that maintain data encryption must have capacity and upgrades to perform such tasks. Without capable systems, the reduction of systems operations can be significantly compromised.
  • 10.  Unrealistic Requirements: If an organization does not understand some of the restraints imposed by data encryption technology, it is easy to set unrealistic standards and requirement which could jeopardize data encryption security.  Compatibility: Data encryption technology can be tricky when you are layering it with existing programs and applications. This can negatively impact routine operations within the system.
  • 11. Advantages of encryption email messages  Separation: Data encryption allows the data to remain separate from the device security where it is stored. Security is included with the encryption which permits administrators to store and transmit data via unsecured means.  No Data Breaches: Data encryption circumvents the potential complications that accompany data breaches which provide ensured protection of intellectual property and other similar types of data.
  • 12.  Encryption Is On The Data: Because the encryption is on the data itself, the data is secure regardless of how it is transmitted. An exception to the rule can be transmission tools such as email because sometimes a typical email account does not provide the necessary security.  Encryption Equals Confidentiality: A lot of organizations are required to meet specific confidentiality requirements and other associated regulations. Encrypting data means that it can only be read by the recipient who has the key to opening the data.
  • 13. Email encryption messages that work with Lotus notes Pegasus Microsoft outlook Novell Groupwise
  • 14. Lotus Notes Security features Public key infrastructure  attenuation  Encryption Access control levels Server , database Document field Strong reputation Extremely few vulnerabilities.
  • 15. Pegasus: a powerful filtering system, so much so that it is possible to run a fully automated client-based electronic mailing list (including processing subscriptions, unsubscriptions and forwards to moderation) using solely Pegasus Mail; the ability to automatically select which email address to send a reply from, based on the mail folder containing the original received message; the ability to include custom e-mail header lines (useful for tracking emails, for example); the ability to delete attachments without deleting the message's text body, or to delete the HTML version of a message while keeping the plain-text version, or vice versa, saving disk space;
  • 16. easy access to a message, including all headers, in raw form, which is difficult or impossible in some other clients; a "tree view" of the structure of a multipart message with all its sections and attachments, giving access to view or save any of the parts separately support for downloading headers only, then deciding for each message whether to download, delete, or leave for later ("Selective mail download"). It is possible to download a message in full without deleting it from the server.
  • 17. Microsoft outlook: Outlook includes security features that allow you to send and receive secure messages over the Internet. To accomplish this, Outlook incorporates support for the Secure Multi-Purpose Internet Messaging Extensions (S/MIME) protocol. Using this standard enables you to send and receive signed or sealed (encrypted) Internet e-mail. This article describes how the following information:  How to get a digital ID for sending secure messages.  How to back up or copy a digital ID.  How to move a digital ID to another computer.  How to send a signed message.  How to add a digital ID to your Contacts list.  How to send an encrypted (sealed) message.  How to sign or encrypt all messages that you send.
  • 18. Novell GroupWise: GroupWise is a messaging and collaboration platform from Novell that supports email, calendaring, personal information management, instant messaging, and document management. The GroupWise platform consists of desktop client software, which is available for Windows, Mac OS X, and Linux, and the server software, which is supported on Windows Server and Linux.
  • 19. The best email encryption software 2016 top ten review
  • 20. As a security level
  • 21. HP Secure Mail Pros : HP Secure Mail provides compliant email communications, a wide range of hardware compatibility and integration with most business applications. It supports one-click and policy-based email encryption and includes numerous reporting options. Cons : If you use Lotus Notes, you have to send inter-office emails using the Lotus security option. HP Secure Mail is not compatible with Android Honeycomb.
  • 22.  Since there are many points both positive and negative to consider, strategic planning for data encryption within an organization is the key. Without detailed planning, data encryption can easily become complex for the IT administrator to manage and complicated for the end users.  organizations should hire professional secure email service that easily overcomes the challenges of simplicity and compatibility, offering the best value for your money. 
  • 23.  https://support.office.com/.../Encrypt-e-mail-messa  searchsecurity.techtarget.com/definition/Pretty-Good- Privacy  https://en.wikipedia.org/wiki/S/MIME  email-encryption-software-review.toptenreviews.com/