5223-4223Sp08Ch16

5223-4223Sp08Ch16 - Information Assurance Management TCOM...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
(c) 2008 Charles G. Gray 1 Information Assurance Management TCOM 5223/MSIS 4223 E-mail and IM Chapter 16 27 March 2008 Charles G. Gray
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
(c) 2008 Charles G. Gray 2 Please turn OFF all cell phones and similar devices. They cause problems with the audio for distance learning students.
Background image of page 2
(c) 2008 Charles G. Gray 3 Objectives List various security issues associated with e-mail and IM Describe some of the security practices for e-mail Describe software used to improve e-mail and IM confidentiality Understand the legal requirements for preserving e-mail and IM Review the CAN SPAM Act
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
(c) 2008 Charles G. Gray 4 Some Key Terms E-mail hoax – An e-mail that has a compelling story, seemingly true, but invariably false Mail relaying – Allowing any host to send e-mail to any other host. E-mail servers should dis- allow this and only permit e-mail to be sent from their individual domain PGP – A popular encryption program, originally “Pretty Good Privacy” S/MIME – Secure/Multipurpose Internet Mail Extensions – encrypted version of MIME SMTP – Simple Mail Transfer Protocol
Background image of page 4
(c) 2008 Charles G. Gray 5 More Terms Spam – Unsolicited commercial e-mail (UCE) Trojan horse – Software that appears to do one thing (and may do so) but hides another unwanted functionality UCE – See Spam Virus – A piece of malicious code that replicates by attaching itself to another piece of executable code Worm – A piece of code that attempts to propagate through penetration of networks and computer systems
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
(c) 2008 Charles G. Gray 6 Tulsa World Newspaper Headline “Fights Rage Over Access to Officials’ e-mail” 16 March 2008 Seven states legally exempt public disclosure of governors’ e-mail Texas deletes the governor’s e-mails weekly State laws are a true hodge-podge Federal law calls for treating all e-mail the same – regardless of the level of office There are over 10,000 laws and regulations in the US covering records compliance Probably at least that many more internationally Much ambiguity and compliance is not optional
Background image of page 6
(c) 2008 Charles G. Gray 7 How Much E-mail is There? Text says 12M per day in 2001 Yahoo! Said it could be as much as 62B per day in 2006 Wikipedia reports 90B per day SPAM e- mails in 2007 They also opine that 85% of e-mail is spam, which yields about 106B total e-mails per day That means that if half of the people in the world have e-mail access, they all send 30-35 per day Is that realistic?
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
(c) 2008 Charles G. Gray 8 E-mail Transmission Security Securing e-mail is an individual user responsibility Security administrators can provide the tools
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 26

5223-4223Sp08Ch16 - Information Assurance Management TCOM...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online