- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Email Effective Security Practices5 Concrete Areas To S.ppt
Email Effective Security Practices:5 Concrete Areas To Scrutinize Internet2 Member MeetingArlington VA, April 20, 2004Joe St Sauver, Ph.D.University of Oregon Computing Center joe@ /~joe/emailsecurity/ Email Security and Its Role in Your Overall Network Security Plan Many of the network security threats you face are directly tied to email security issues. Unfortunately, because email is considered to be rather “mundane” or plebian, email security issues sometimes get short shrift. In point of fact, email security deserves extra attention because it is the one application that is truly ubiquitous, and is truly mission critical. Our goal is to highlight five concrete areas to scrutinize during our ten minute long slot. We’ll assume a Unix-based email environment. #1: Encrypt Your POP IMAP Traffic Hacker/crackers love to sniff ethernet traffic for usernames and passwords. One of the most common sources of usernames and passwords on the wire consists of clear text POP and IMAP logins to campus mail servers. Most popular POP and IMAP clients and servers now support TLS/SSL encryption, including Eudora, Outlook, Entourage, Mozilla, Mulberry, OS X’s Mail program, etc. (See the recipes at/security/email/ ) If you are NOT requiring encrypted POP and IMAP logins, the time has come to do so. Controlling Other Plaintext Password Exposures If you also offer a web email interface, be sure it is also always encrypted (runs via “https”) too. Require ssh (not telnet or rlogin) for any access to Pine or similar command line email programs. Replace ftp with scp or sftp, etc. Work to eliminate any legacy shared (rather than switched) network segments (switched ethernet is not a panacea, true, but it can help) SecureID/CryptoCard-type token based auth systems may also be worth testing/evaluation Encourage use of GPG (/ ) SMTP Auth With STARTTLS While you’re encrypting POP and IMAP traffic, you might as well also require SMTP Auth (RFC 2554) over a TLS encrypted channel as we
您可能关注的文档
最近下载
- (湘科2024版)科学一年级上册全册教学案.pdf VIP
- 环氧磨石地坪施工方案.doc VIP
- 2024-2025学年统编版(2024)小学道德与法治五年级下册(全册)教学设计及反思(附目录P110完整版).docx VIP
- 四川省2024年普通高等学校高职教育单独招生文化考试(普高类)语文真题及答案解析(真题解析版).docx VIP
- 混龄游戏活动对小班幼儿社会性发展的影响研究.pdf VIP
- 2025道路沥青红外光谱法快速识别技术规程.docx VIP
- 输变电工程标准工艺(变电工程电气分册)2024版.pptx VIP
- 《VFD-E_使用手册》.pdf VIP
- 小学五年级数学课题研究计划.docx VIP
- 2025《基于S7-1200控制器的S电站渗漏排水系统电气控制设计》14000字.docx VIP
文档评论(0)