e-mail and instant messaging

25
Principles of Computer Security: CompTIA Security+ ® and Beyond, Second Edition © 2010 E-mail and Instant Messaging Chapter 16

Upload: jasper-daniel

Post on 30-Dec-2015

49 views

Category:

Documents


0 download

DESCRIPTION

E-mail and Instant Messaging. Chapter 16. Objectives. Describe security issues associated with e-mail. Implement security practices for e-mail. Detail the security issues of instant messaging protocols. Key Terms. AOL Instant Messenger (AIM) Botnet E-mail E-mail hoax Encryption - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

E-mail and Instant MessagingE-mail and Instant Messaging

Chapter 16

Page 2: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Objectives

• Describe security issues associated with e-mail.• Implement security practices for e-mail.• Detail the security issues of instant messaging

protocols.

Page 3: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Key Terms

Page 4: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

E-mail Usage

Page 5: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Security of E-mail• Originally launched unsecure; remains unsecure.

• Internet e-mail depends on three primary protocols:– SMTP– POP3– IMAP

• Used as a medium:– To spread viruses– To forward hoaxes

• Similar to Instant Messaging.

Page 6: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Example List of Spam E-mails

Page 7: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

AOL Instant Messenger Program

Page 8: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Malicious Code

• Can be found and dispersed by many different methods:– Worm

– Virus

– Trojan horse program

– Botnet

Page 9: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Viruses Commonly Spread Through E-mail Attachments

Page 10: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

• Malicious Code Protection Measures– Antivirus

– E-mail scan

– Disable • Preview panes

• Scripting support

– Follow safe practices and procedures

– Educating employees

Page 11: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Hoax E-mails

• E-mail hoaxes are mostly a nuisance, wasting everyone’s time, taking up Internet bandwidth and server processing time as well.

• Sites like Snopes.com debunk such hoaxes.

Page 12: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

• Famous Hoax: The Neiman-Marcus story

Page 13: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Unsolicited Commercial E-mail (Spam)

• Spam refers to unsolicited commercial e-mail whose purpose is the same as the junk mail you get in your physical mailbox—it tries to persuade you to buy something.

• The term spam comes from a skit on Monty Python’s Flying Circus, where two people are in a restaurant that serves only the potted meat product.

• This concept of the repetition of unwanted things is the key to e-mail spam.

Page 14: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

• Ways to fight spam include:– E-mail filtering

– Educate users about spam• Cautious internet surfing

• Cautious towards unknown e-mail

– Shut down open relays

– Host/server filters

– Blacklisting or DNSBL

– Greylisting

Fighting Spam

Page 15: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Mail Encryption

• Provision for confidentiality or more commonly known as privacy.

• E-mail is sent in the clear—clear text—unless the message and/or attachments are encrypted.

• E-mail content encryption methods include:– S/MIME

– PGP

Page 16: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

S/MIME

• Secure/Multipurpose Internet Mail Extensions (S/MIME) is a secure implementation of the MIME protocol specification. MIME was created to allow Internet e-mail to support new and more creative features.

• MIME allows e-mail to handle multiple types of content in a message, including file transfers.

• Every time you send a file as an e-mail attachment, you are using MIME.

• S/MIME takes this content and specifies a framework for encrypting the message as a MIME attachment.

Page 17: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Configuration Settings in Outlook

Page 18: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Pretty Good Privacy (PGP)• PGP implements e-mail security in a similar

fashion to S/MIME, but uses completely different protocols.

• The basic framework is the same:– The user sends the e-mail, and the mail agent

applies encryption as specified in the mail program’s programming.

– The content is encrypted with the generated symmetric key, and that key is encrypted with the public key of the recipient of the e-mail for confidentiality.

Page 19: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

• PGP manages keys locally in its own software.

• This is where a user stores not only local keys, but also any keys that were received from other users.

• A free key server is available for storing PGP public keys.

Pretty Good Privacy (PGP)

Page 20: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Decoding a PGP-encoded Message in Eudora

Page 21: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Pretty Good Privacy (PGP)

• PGP has plug-ins for many popular e-mail programs, including Outlook and Qualcomm’s Eudora.

• These plug-ins handle the encryption and decryption behind the scenes, and all that the user must do is enter the encryption key’s passphrase to ensure that they are the owner of the key.

Page 22: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Instant Messaging

• Technology that allows individuals to chat online.

• AOL Instant Messenger (AIM) is a prevalent chat application.

Page 23: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Instant Messaging

• To work properly IM has to:– Attach to a server (typically announcing the IP

address of the originating client)– Announce your presence on the server

Page 24: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Instant Messaging

Page 25: E-mail and Instant Messaging

Principles of Computer Security:CompTIA Security+® and Beyond, Second Edition

© 2010

Chapter Summary

• Describe security issues associated with e-mail.

• Implement security practices for e-mail.

• Detail the security issues of instant messaging protocols.