Email Effective Security Practices5 Concrete Areas To S.ppt

Email Effective Security Practices5 Concrete Areas To S.ppt

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Email Effective Security Practices5 Concrete Areas To S.ppt

Email Effective Security Practices: 5 Concrete Areas To Scrutinize Internet2 Member Meeting Arlington VA, April 20, 2004 Joe St Sauver, Ph.D. University of Oregon Computing Center joe@ /~joe/emailsecurity/ Email Security and Its Role in Your Overall Network Security Plan Many of the network security threats you face are directly tied to email security issues. Unfortunately, because email is considered to be rather “mundane” or plebian, email security issues sometimes get short shrift. In point of fact, email security deserves extra attention because it is the one application that is truly ubiquitous, and is truly mission critical. Our goal is to highlight five concrete areas to scrutinize during our ten minute long slot. We’ll assume a Unix-based email environment. #1: Encrypt Your POP IMAP Traffic Hacker/crackers love to sniff ethernet traffic for usernames and passwords. One of the most common sources of usernames and passwords on the wire consists of clear text POP and IMAP logins to campus mail servers. Most popular POP and IMAP clients and servers now support TLS/SSL encryption, including Eudora, Outlook, Entourage, Mozilla, Mulberry, OS X’s Mail program, etc. (See the recipes at /security/email/ ) If you are NOT requiring encrypted POP and IMAP logins, the time has come to do so. Controlling Other Plaintext Password Exposures If you also offer a web email interface, be sure it is also always encrypted (runs via “https”) too. Require ssh (not telnet or rlogin) for any access to Pine or similar command line email programs. Replace ftp with scp or sftp, etc. Work to eliminate any legacy shared (rather than switched) network segments (switched ethernet is not a panacea, true, but it can help) SecureID/CryptoCard-type token based auth systems may also be worth testing/evaluation Encourage use of GPG (/ ) SMTP Auth With STARTTLS While you’re encrypting POP and IMAP traffic, you might as well also require SMTP Auth (RFC 2554) over a TLS encrypted channel as we

文档评论(0)

gshshxx + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档