SlideShare a Scribd company logo
Encrypting emails using
Step 1:Installing Kleopatra PGP Step 2: Creating your own certificate
Step 2:Completing personal information
Step 2: Creating your passphrase
Step 3: Exporting your Certificate  and your Secret key
Step 4 : Importing  your recipient certificate from file or server
Step 5: Ataching your secret key and your certificate into email
Step 6 : Encrypting your message
Step 6: Encrypting your message
Step 7 : Sending the email
Encrypting emails using Kleopatra PGP ,[object Object],[object Object],[object Object]

More Related Content

What's hot

FortiGate 60C
FortiGate 60CFortiGate 60C
FortiGate 60Cdwaeyaert
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.Priyanka Aash
 
Mobile Network Attack Evolution
Mobile Network Attack EvolutionMobile Network Attack Evolution
Mobile Network Attack EvolutionPositive Hack Days
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Microsoft Security Development Lifecycle
Microsoft Security Development LifecycleMicrosoft Security Development Lifecycle
Microsoft Security Development LifecycleRazi Rais
 
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdfjames yoo
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions5 Steps To Effective Jad Sessions
5 Steps To Effective Jad SessionsLizLavaveshkul
 

What's hot (20)

TrendMicro
TrendMicroTrendMicro
TrendMicro
 
SDLC
SDLCSDLC
SDLC
 
FortiGate 60C
FortiGate 60CFortiGate 60C
FortiGate 60C
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Mobile Network Attack Evolution
Mobile Network Attack EvolutionMobile Network Attack Evolution
Mobile Network Attack Evolution
 
CEH
CEHCEH
CEH
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Microsoft Security Development Lifecycle
Microsoft Security Development LifecycleMicrosoft Security Development Lifecycle
Microsoft Security Development Lifecycle
 
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions
 

More from Lupu Cosmin

CoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftCoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftLupu Cosmin
 
Romanian keyboard layout in windows
Romanian keyboard layout in windowsRomanian keyboard layout in windows
Romanian keyboard layout in windowsLupu Cosmin
 
Romanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuRomanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuLupu Cosmin
 
Gnome Orca Magnifier
Gnome Orca MagnifierGnome Orca Magnifier
Gnome Orca MagnifierLupu Cosmin
 
Google Docs Feedback
Google Docs FeedbackGoogle Docs Feedback
Google Docs FeedbackLupu Cosmin
 
Cloud Computing -everything you want to know
Cloud Computing -everything you want to knowCloud Computing -everything you want to know
Cloud Computing -everything you want to knowLupu Cosmin
 

More from Lupu Cosmin (9)

CoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftCoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by Microsoft
 
lupucosmin
lupucosminlupucosmin
lupucosmin
 
Dia
DiaDia
Dia
 
Romanian keyboard layout in windows
Romanian keyboard layout in windowsRomanian keyboard layout in windows
Romanian keyboard layout in windows
 
Romanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuRomanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntu
 
Diac in ym
Diac in ymDiac in ym
Diac in ym
 
Gnome Orca Magnifier
Gnome Orca MagnifierGnome Orca Magnifier
Gnome Orca Magnifier
 
Google Docs Feedback
Google Docs FeedbackGoogle Docs Feedback
Google Docs Feedback
 
Cloud Computing -everything you want to know
Cloud Computing -everything you want to knowCloud Computing -everything you want to know
Cloud Computing -everything you want to know
 

Encrypting emails using Kleopatra PGP