E-Mail Security: Issues and Solutions
E-Mail Security: Issues and Solutions
E-Mail Security: Issues and Solutions
I. INTRODUCTION
E-mail travels on the web so they are exposed to the intruders.
So, privacy of emails may be compromised b/w sender’s and
receiver’s side without giving any warning. In today’s A. How e-mails go and who can access it?
electronic world, e-mail becomes the backbone of the most Basically, E-Mails are based on point to point communication.
organizations’ daily activity. As we know email becomes most With the help of an example it becomes clear to you that who
frequent in the world so e-mail security becomes more can access the email. If kavita sends an email to Ritika. Then
important. For the security, organizations must control the Kavita’s computer system creates a virtual connection with
situations by taking any approach or invest wisely including Ritika’s system, it is called computer synchronization.
all the solutions. Messages between them are transferred by SMTP (Simple
Let consider the services provided by e-mail to the business, Mail Transfer Protocol). Consider Ritika is not online at the
email storage and management can be broken down into a moment and Kavita wants to send message to her. This
number of components like flow of the mail, storage of the message is stored at the server i.e. called POP (Post Office
mails, how do we exchange public keys, how do we assign Protocol) server. Next time whenever Ritika will be online,
trust and how user access the emails. These issues are the part she can download the message and can read them also.
of total security agenda. Kavita’s message is for Ritika and hence is private. So we
In section II you’ll study about how emails go and who can choose point to point communication but while the message is
access it and some threats to email, spamming, spoofing etc. sitting on the server, it is potentially exposed to everyone.
In section III you’ll study examples of email security means For better understanding we can consider another example i.e.
by taking a technique we can provide security to mails. let Sarika is an employee of large organization, it may be an
industry or any university or any other organization. So she
II. SECURING E-MAIL can’t create an outbound connection by herself. All her
messages are routed through a server and as a result her
E-Mails are most frequently used in today’s commerce. Now-
privacy is compromised. Another complication is aliases and
a-days these are the most convenient way of communication
forwarding agents – who add more mid points. By taking a
for ordinary users. E-Mails are public and can be seen by
simple case we can see that there’ll five points or parts:-
everyone at every point of communication between two users.
Hence, because of their exposed nature we can’t write
sensitive information in ordinary e-mails. We can
i. Kavita and her system
ii. Kavita’s organisation’s SMTP server
Public key
Encryption Encrypted
Message
Header+
Body
Message
encryption
key
REFERENCES
[1] Book: Security in Computing by Charles P. Pfleger.
[2] www.wikipedia.org
[3] www.CISCO.com
[4] www.purdue.edu/decurepurdue/docs/training/using_secure_email.pdf
[5] www.csrc.nist.gov
[6] www.cs.columbia.edu/~smb/classes/so9/11.org
[7] www.cypherpunles.to/~peter/T5_email.pdf
[8] www.pgp.com
[9] http://www.helpnetsecurity.com/
[10] www.marknoble.com/tutorial/smime/smime.aspx
AUTHORS PROFILE