What Research About Websites Can Teach You

08/12/2017 Off By vishlenup

Ways of Securing Email.

In many sectors of society, the preferred method of communication is through email. Using email may be very easy and convenient for most of us, but we must take care to protect the data that we are transmitting, whether in its body or the attachments that you send. If you send email over the internet or a network, there are many threats to it including the interception of messages, modification of origin or content, forgery of content or origin by an outsider, forgery of origin or content by the recipient, or the denial of message transmission.

Many times we send email that contain confidential or financial data to people within our company or sometimes even to people outside the company. If your email is not encrypted, then it can be monitored and intercepted in many ways. If this is the case, then your emails can easily be read, copied, and modified by unauthorized or malicious persons. These malicious users retrieve someone’s personal data and with this he can do a lot of bad things like emptying the victim’s financial accounts, run charges on existing credit cards, apply for loans, credit cards, services or benefits in the victims’ name, etc.

You allow potential threats to re-create email from a company asking for sensitive information is email is monitored on a network. This is known as phishing or fraudulent mails trying to persuade individuals to give up important personal information such as an account name or password.

Phishing emails look exactly like the original complete with company logo, color scheme, and format. It could be a bank or an internet vendor asking for information. The name for this deceptive attempt to gain information through fraudulent means is social engineering. The links in the email are changed to the one used by the phisher. You can be asked to log on to your account and other immediate actions that they demand. Phishers are able to get your account name and passwords since you will be asked to register it in the web pages that they create. Below are some important things that can help prevent phishing and forgery in emails.

A service that controls and logs access to systems, resources, and applications that protects against unauthorized use is called access control. To help prevent unauthorized persons accessing your email messages sent to someone else on a network, the network has to be secured using passwords or account names.

Authentication can prevent disguised attackes. With digital signatures the emails are authenticated. Unilateral or mutual authentication are the two ways to authenticate identities In mutual authentication, both parties verify each other. Unilateral authentication, on the other hand, requires only one party to verify his identity.

Confidentiality and integrity involve data being transmitted securely and not modified while in transit. When data is in transit, it is protected from unauthorized modification through confidentiality and integrity.