Secure_Email_Application

Secure_Email_Application - SecureEmailApplication...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Secure Email Application Project Team:                  Donpattara P                  Krushitha P                  Ray Roeder                  Mohammad A                  Vismi KV Advisor:  Dr. Ronald P. Uhlig
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Outline Secure Email Overview What to do to Secure MS Outlook? Demo of Exchanged Emails Securing e-Mail App in Cell Phone High Level Design Conclusions
Background image of page 2
WCM605 Wireless Security Secure Email Overview               Threats to E-mail System[1] Information Disclosure Modification of Message Replay of Recorded Message Masquerade-Sending Messages pertaining to be from some one  else Spoofing –Insertion of False Messages in the system 1. Roger J Sutton, Secure Communications Applications & Management, 2002, Wiley Series, NY.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
WCM605 Wireless Security Secure Email Overview              Method of Attacks[1] IT Personnel Server/PC Maintenance Server Backup’s Unauthorized User Network Capturing 1. Roger J Sutton, Secure Communications Applications & Management, 2002, Wiley Series, NY.
Background image of page 4
WCM605 Wireless Security Secure Email Overview              Why Secure Email? Transmission Media Internet~Untrustworthy Ensure Authentication, Data Integrity, Privacy Eliminate Spam, Virus attachments
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
WCM605 Wireless Security Secure Email Overview Logical: Cryptography Authentication Digital signatures Virus Scanning Network Design to Counter DOS attack Organizational: Policy Structure Personnel Training 1. Roger J Sutton, Secure Communications Applications & Management, 2002, Wiley Series, NY.
Background image of page 6
WCM605 Wireless Security MS Outlook Cryptography Uses Certificates ~Ensure Secure Communication S/MIME Digital Signatures Encryption Step1:   Obtain a Digital ID from CA(Certificate Authority
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/29/2011 for the course CSC 607 taught by Professor Dr.pradipp.dey during the Spring '11 term at National.

Page1 / 21

Secure_Email_Application - SecureEmailApplication...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online