Security and Privacy
|
|
- Chad Curtis
- 5 years ago
- Views:
Transcription
1 Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila
2 1. Introduction Today there are millions of people in the world that use and many of them use free services offered on the Internet by several companies. is an integral part of our jobs in the workplace, but it is also plays an important role in our everyday lives outside of work. Many of us rely on these web-based services as a form of communication for financial transactions, job offers, and personal correspondence. Many of these webmail services ask you for some type of personal information when signing up for an account to prove who you are and also to be used as verification if you should ever forget your password. We think that our is secure because we have to input a password to access it. But how secure is our really and how secure is our account information? We will set out to find out just how well companies such as Google, Yahoo, and Microsoft protect our account information. While we would all like to think that our information is being kept really secure in this advanced technological society, it is really not as safe we assume it is. We are all increasingly using our to communicate personal information and financial transactions and hackers know that as well. With that, they will stop at nothing to try to gain access into as many accounts as possible for personal gain. They are always changing their method of attack and some of these companies providing webmail services have not been able to implement security policies properly to counter these attacks. Security and Privacy 2
3 2. How Webmail Works Webmail is not too different from regular . In fact, you could think of webmail as a special type of . Unlike regular , you do not access your account using a program on your computer such as Outlook or Thunderbird. Instead, you access your account from a website, which then gives you a web interface to your . No messages are stored physically on your computer, so you do not have access to them while you are offline. However, similar to regular , all of your messages are stored on a server owned by the host. Whenever you compose a message from within the web interface, you are essentially communicating with that mail server. Your sent message goes from your computer to the outgoing mail server. The message then gets transmitted to another server that holds the recipient s messages. Figure 1: How gets sent and received 1 The recipient is able to view the message once they log in to their from a computer. They can then read the message and reply to it, if they so choose. Replying to an message involves the same process as sending an . Security and Privacy 3
4 3. Accessing Webmail Accounts In order for a person to get access to their web based , they must first log in to the system. This is done by visiting the host s webpage and entering your username and password (E.g. mail.yahoo.com, hotmail.com, gmail.com). Most people who know are technologically adept know that the standard HTTP protocol is not a safe way of transmitting log in credentials such as usernames and passwords. Yet, we are still faced with the dilemma of how to log in to our webmail securely 2. Most companies who provide web based present their log in page to you in HTTPS. This means that they are using Secure Socket Layer (SSL) technology to encrypt your username and password before it is sent over the internet to their server Securely Accessing Webmail In order to securely log in to on the internet, your username and password must be encrypted before being sent to a server to verify that you can access the specified account. Both Yahoo! and Google redirect their log in pages to ones that are using SSL. It doesn t matter if you only entered the URL using the HTTP protocol, the page will redirect it to the HTTPS protocol. This is at least the minimum that should be required of free webmail providers. Microsoft, however, does not quite understand this concept just yet. Their login page for webmail services is still a default HTTP protocol with no encryption. The option to have your addressed remembered on the specific computer is even checked so a cookie with your address is stored on the computer automatically unless you uncheck it. There is an option however, for you to login to Microsoft securely, however, you must click and choose that option. For many users of , they will just type the URL of the page and log in, not knowing whether or not it is secure. There should be no reason why login pages are still using the HTTP protocol, especially when there have been increasingly reported attempts at hackers stealing account information and using them to either spam people or to gain access to someone s account at a financial institution. The fact that Microsoft s login page is not secure puts into question how well and how committed Microsoft is to protecting your information. Security and Privacy 4
5 Figure 2: Microsoft Insecure Login 4. Gaining Access Without a Password Because webmail is not an system hosted in a corporate business culture, resetting a password is not as simple a making a phone call to your IT administrator. Most webmail services will provide you with some way to reset your password in case you have forgotten it. However, others who wish to access your account can also use these tools to do so. Microsoft and Yahoo! ask you for your address and then ask you a few questions before you can reset your password. Questions ask your postal code, birth date, and Microsoft adds a security question that you chose when you signed up. If someone knows you well or at least your location information, they can easily gain access into your account and reset your password. In order to make this more secure, Yahoo! and Microsoft should set the first option to send an to the person s secondary address with a link to reset their password. Google s GMail is Security and Privacy 5
6 pretty secure in this aspect because the first thing it does is send an to your secondary e- mail address. If you do not have a secondary address, then you must go for 24 hours without any activity on your account before they present you with the security question that you chose when you signed up for the account. This poses a significant obstacle to hackers or others that want to access your account with malicious intent. 5. Content Security Many of us would like for our providers to provide a level of security where our messages are protected from outsiders and also where we are protected from s that contain malicious content Sending We care about the security and protection of our usernames and passwords for our accounts, but not many of us worry about the security of the content in our s. We expect or assume that just works and only the person the message was addressed to will be able to read it. This is true if you encrypt your messages before sending them using an client such as Outlook or Thunderbird. What security do webmail providers give us in terms of ensuring our is secure? In reality, they do not offer anything more or less than what a desktop client offers, which is not much. Most s you send are sent over the internet unencrypted. This means that anyone or any computer that your message travels through can intercept and read the contents of your message. This is a wake up call for many users because they do not often think about the inner workings of an system; they just expect it to work and deliver the message to where it is supposed to go. While Yahoo! and Microsoft may have secure login pages for their users, they do not offer much in terms of security once the user is actually logged in. After users have logged in, they access their account and inbox features through the normal HTTP protocol without any security. This poses many threats for the individual user because anyone that is using a packet sniffer can easily grab the information being sent over the network and read it. This poses one additional risk against users because if anyone is specifically targeting them with a packet sniffer and they do not encrypt outbound s, then the attacker can gain a plethora of information without really trying. Security and Privacy 6
7 Google s GMail service however, does not have this same problem that Microsoft and Yahoo! have. Google can be set to automatically ensure that a user s session (period of time they are logged in) is transmitted over the internet using SSL. This means that the entire connection between Google s mail server and the user s computer is encrypted. Every action taken, including deletion, composing, and sending are encrypted before being sent back over the network to Google s servers. This makes their system a little more secure. It prevents or at least deters attackers from being able to sniff out any worthwhile information from your internet packets. They can however, still intercept packets, but they cannot do anything with those packets unless they have the key to decrypt them. End user s however, should not take this as Google encrypting their completely. They should understand that it is only encrypted until it gets to Google s servers. Once it leaves Google s servers to be delivered to the destination provider, the contents of the can once again be intercepted and read easily by anyone. Figure 3: Gmail Session in HTTPS Security and Privacy 7
8 5.2. Encryption of While many s can be signed and encrypted on desktop clients using methods such as S/MIME and PGP, encrypting webmail is a much more difficult process. Using certificates with S/MIME is sometimes considered to be not suited for webmail 3. PGP is now proprietary software, however there is an open-source version available called GnuPG. Using an encryption technique like GnuPG is great when you have a desktop client because GnuPG is a command-line tool. You can encrypt the on your computer before sending it. With webmail however, you are composing a message in a web browser, so the message is not really on your computer. With this, there come complications in encrypting the messages you send. Encryption of even on desktop clients is not an easy task, much less encrypting webmail messages. It is a complex process which deters many users from implementing it. However with a tutorial online to walk those through it and a Firefox browser extension (FireGPG), users can begin to encrypt their web-based messages in no time 4. These tools are freely available and do not actually take very long to set up. Figure 4: FireGPG courtesy of Crunchgear.com 4 Security and Privacy 8
9 5.3. Receiving Users of free web-based systems have come to expect built-in spam filters. Users demand now that these filters work right off the bat without them having to make any customizations. For the most part these spam filters do what they are supposed to do and send spam and phishing messages to the junk folder. There is the occasional slip up however that gets past the filters and makes it into your inbox. What happens if a user was to accidentally click on one of these messages and there were malicious content hidden within the ? The good thing is that most web based providers now automatically block dynamic HTML content and graphics in s when you first open them. These content providers have a vested interest in protecting their user s computers from becoming infected because it then reduces the number of other users on their network that are infected. What about spoofed s? What are spoofed s? Spoofed s are messages that arrive in your inbox that claim they are sent from someone when they are in reality not. For example, an can arrive in your inbox and claim that you sent it to yourself, but in reality it was sent by someone else. Assuming your account has not been compromised, this is a prime example of a spoofed . Because of attacks like this and phishing scams, Google, Yahoo, and Microsoft have all implemented technologies into their systems to verify a sender. Yahoo! and Google have implemented a technology called DKIM (DomainKeys Identified Mail) 5. DKIM allows the sender or sending organization vouch for the authenticity of their s while they are being sent over the internet. The reputation of the company will determine whether the message is trusted for delivery or not 5. DKIM basically allows for a sender to digitally sign their s and verify that they are legitimate. For example, EBay currently has implemented DKIM and uses it on all of their outgoing s. Because of this, when legitimate EBay s are sent to Yahoo accounts, they are actually delivered, whereas fake EBay s are denied delivery and never make it to your account. We will see however, that this works most of the time, but there are instances where this fails. Security and Privacy 9
10 Example of DKIM Failure Figure 5: Attempt to get past DKIM The screenshot above is from the free webmail service, Fastmail.fm. It allows you to add a From address that you want to have your s sent from. This feature is available on all clients; however, you must first verify that the you are trying to use belongs to you. Fastmail, however, requires no such verification and as such, you can make an look like it came from an address that does not belong to you. With this, I wanted to test to see if DKIM would catch the fact that the was not really coming from the same account it was being addressed to. Figure 6: Forged arrives in Inbox without problems Security and Privacy 10
11 Figure 7: Header of preceding As you can see, the forged that I sent arrived in the inbox without any problems. I have even included the header of the message to prove that I did not send that message to myself from within Yahoo Mail. I can only assume that this happens because Yahoo s DKIM service is fooled into thinking this actually came from yahoo.com. This does not only happen for Yahoo Mail, it happens for Google s Gmail as well because they both use DKIM technology. Hotmail does not use DKIM, but instead use their own technology called Sender ID to verify a sender of an message 6. What will happen when we repeat this experiment, but send it to a Hotmail address instead? Security and Privacy 11
12 Figure 8: Forged in Junk Mailbox Figure 9: Header for preceding Security and Privacy 12
13 As you can see, the was immediately sent to the Junk folder of Hotmail and the content was even blocked automatically and you could not see the message until you specifically allowed it. This is a great security measure implemented by Hotmail and it helps protect its users from spoofed s. 6. Conclusion is used by many people today as one of their main forms of communication. Many of those users also like to be able to access their from wherever they are without having to carry around their own computer. As such, it is imperative that web-based providers offer their users plenty of security measures. They should protect their users from account hijacks and also protect the information that is in a user s account, content included. While encryption of s may take too many resources to be correctly implemented in a webmail system, the content providers should at least provide an easily accessible tutorial for their users to follow should they want to implement encryption on their own. With the exception of Google, providers still have a ways to go in making sure that it is as difficult as possible for someone to hijack another user s account. is a great resource and it would be beneficial for many if these webmail providers would offer more in terms of security and privacy for their users. Security and Privacy 13
14 References 1. How Works < 2. New Tool Automates Webmail Account Hijacks < ml> 3. Obstacles to Deploying S/MIME < 4. How to Protect your Webmail with GnuPG and FireGPG < 5. DomainKeys Identified Mail < 6. Sender ID < 7. Pfleeger, C. and Pfleeger, S., Security in Computing, 4 th Edition. 8. Webmail Security: Best Practices for Data Protection < Security and Privacy 14
BEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationSecure Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
More informationIntroduction to
Introduction to Email Overview 1. What is Email?... 2 2. Creating an Email Account... 3 3. Managing Messages... 8 4. Sending and Replying to Emails... 9 5. Signing Out... 15 519-579-3800 * ConnectKW@waterlooregion.org
More informationIntroduction to
Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationIntroduction. Logging in. WebMail User Guide
Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks
More informationSecurity Using Digital Signatures & Encryption
Email Security Using Digital Signatures & Encryption CONTENTS. Introduction The Need for Email Security Digital Signatures & Encryption 101 Digital Signatures & Encryption in Action Selecting the Right
More informationComputer Basics 4 Basics Revision 3 ( )
Computer Basics 4 E-mail Basics Revision 3 (1-10-2014) E-MAIL E-mail or electronic mail allows you to send and receive messages from anyone in the world with an e-mail address. To access e-mail you need
More informationUSER GUIDELINES. Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?
USER GUIDELINES Revision 1.8 20 August, 2015 Q 1. How can I log into my webmail? Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?
More informationSpam Protection Guide
Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed
More informationMy The guide.
My email The guide Read our Blog: http://.co.uk/blog View our support site: http://123-reg.co.uk/support Follow us on Twitter: https://twitter.com/123reg Contents 1. How do I get my own personalised email
More informationIntroduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...
WEB MESSAGE CENTER END USER GUIDE The Secure Web Message Center allows users to access and send and receive secure messages via any browser on a computer, tablet or other mobile devices. Introduction...
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationYour message is sent from your computer to a server (like the post office) where the
E-mail it s convenient, cheap and easy. Today, it is the most rapidly growing means of communication. All e-mail programs are slightly different. Gmail, Hotmail, and Yahoo! are some popular e-mail programs.
More informationCS348: Computer Networks (SMTP, POP3, IMAP4); FTP
CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange
More informationIntroduction to SSL. Copyright 2005 by Sericon Technology Inc.
Introduction to SSL The cornerstone of e-commerce is a Web site s ability to prevent eavesdropping on data transmitted to and from its site. Without this, consumers would justifiably be afraid to enter
More informationWelcome to the world of .
Welcome to the world of e-mail. E-mail, short for electronic mail, allows computer users to easily send messages back and forth between acquaintances around the world. There are a variety of ways to do
More informationWorkshop. Part 1: Creating your account. 1) In the top search bar, type in gmail.com 2) Click on create account
Email Workshop Purpose: The purpose of this class is to guide you through creating your own email account, and introduce you to the basic functions of your account. This packet will assist you with the
More informationContents. Management. Client. Choosing One 1/20/17
Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,
More informationBasics. Prepared by Christine Anning June 2011 Modified by Emilie Hanson March 2012
Computer Basics Handouts: Email Basics Prepared by Christine Anning June 2011 Modified by Emilie Hanson March 2012 St. Catherine University, MLIS Department 2004 Randolph Ave, St Paul MN 55105 www.stkate.edu/academic/mlis/
More informationHow to Stay Safe on Public Wi-Fi Networks
How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi
More informationThe Activist Guide to Secure Communication on the Internet. Introduction
The Activist Guide to Secure Communication on the Internet Posted by: The Militant Posted on: September 3rd 2008 Updated on: September 8th 2008 Introduction 1 - Secure Internet Access 1.1 - Internet Cafes
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More informationUser Manual Documentation
User Manual Documentation Overview Dated: 10 th February 2018 Webmail is essentially using a web browser, such as Internet Explorer or Firefox, to access your Email account. The advantages of such a system
More informationComputer Foundation Skills. Internet Webmail
Computer Foundation Skills Internet Webmail Table of Contents Contents Webmail... 4 Gmail Create an account... 5 Gmail - Passwords... 6 Gmail - Inbox... 7 Gmail View message... 7 Gmail Compose mail...
More informationCyber Security Guide for NHSmail
Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,
More informationGuidance for sending and receiving an encrypted NHSmail
Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted
More informationBasics. Setting up an Account. Inbox. Your inbox is your starting place when you open your . Your inbox contains all the s that have
Email Basics Welcome to Email Basics. Today we will be covering how to send an email, how to add attachments, how to reply or forward an email, and how to use the different folders in your email account.
More informationUser Manual Version
User Manual Version 14.5.3 Contents KeyHelp User - Manual Contents 1. The current KeyHelp 4 1.1. KeyHelp Version 14...4 1.2. Finding a fault and being stuck with it?...4 1.3. Who is this manual for?...4
More informationAccessing Encrypted s Guide for Non-NHSmail users
Accessing Encrypted Emails Guide for Non-NHSmail users April 2017 Version 2.1 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental
More informationChoic Anti-Spam Quick Start Guide
ChoiceMail Anti-Spam Quick Start Guide 2005 Version 3.x Welcome to ChoiceMail Welcome to ChoiceMail Enterprise, the most effective anti-spam protection available. This guide will show you how to set up
More informationWeb Security, Summer Term 2012
IIG University of Freiburg Web Security, Summer Term 2012 Brocken Authentication and Session Management Dr. E. Benoist Sommer Semester Web Security, Summer Term 2012 7 Broken Authentication and Session
More informationWeb Security, Summer Term 2012
Table of Contents IIG University of Freiburg Web Security, Summer Term 2012 Brocken Authentication and Session Management Dr. E. Benoist Sommer Semester Introduction Examples of Attacks Brute Force Session
More informationSecurity PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India
Email Security PGP / Pretty Good Privacy SANOGXXX 10-18 July, 2017 Gurgaon, Haryana, India Issue Date: [31-12-2015] Revision: [V.1] Security issues for E-mail Confidentiality Network admin can read your
More informationRecipient USER GUIDE
Recipient USER GUIDE General Information What is smartmail? smartmail is smartview s proprietary email encryption system used to protect your personal and transaction related information. What is smartportal?
More informationYour security on click Jobs
Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can
More informationInternet and Mini.K.G Senior Scientist, FRAD, CMFRI
Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several
More informationPROTECTING YOUR BUSINESS ASSETS
PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina
More informationAmazon WorkMail. User Guide Version 1.0
Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
More informationManually Create Phishing Page For Facebook 2014
Manually Create Phishing Page For Facebook 2014 While you are creating phishing page manually you have to do a lot of work Web Templates -- For importing premade template for Gmail, Facebook from SET.
More informationLife After Webmail Reference Guide
Life After Webmail Reference Guide (An Introduction to Outlook Web Access 2007 Client User Interface) https://owa.wiu.k12.pa.us Westmoreland Intermediate Unit Information Technology Services 102 Equity
More informationThunderbird IMAP Instructions Bloomsburg University Students
This guide will assist you in setting up Thunderbird to work with your student email account using IMAP. Thunderbird is a free multi platform email client available from Mozilla at http://www.mozillamessaging.com/.
More informationUsing BBC Raw
Electronic mail, or email is a quick way of sending messages to people using the internet. As with a postal address, an email address is made up of different parts, for example: tom@bbc.co.uk tom is your
More informationElectronic mail, or is a quick way of sending messages to people using the internet.
Using email Electronic mail, or email is a quick way of sending messages to people using the internet. As with a postal address, an email address is made up of different parts, for example: tom@bbc.co.uk
More informationSECTION 5 USING STUDENT
SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling
More informationOn the Surface. Security Datasheet. Security Datasheet
Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record
More informationSectigo Security Solution
Sectigo Email Security Solution 2018 Sectigo. All rights reserved. Email hacking is a commonly used malicious tactic in our increasingly connected world. Business email compromise (BEC), or email account
More informationIntroduction. Logging in. WebQuarantine User Guide
Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine
More informationOnline Scams. Ready to get started? Click on the green button to continue.
Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,
More informationDOWNLOAD PDF OUTLOOK EXPRESS CONFIGURATION STEPS
Chapter 1 : How To Setup Outlook Express Email - Email Support Edit Article How to Configure Outlook Express. In this Article: Determining Which Server to Use Configuring Outlook Express Client Community
More informationBinarytech Digital Education Karta Allahabad ( Notes)
Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail
More informationWayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk
Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging
More informationAn Overview of Webmail
An Overview of Webmail Table of Contents What browsers can I use to view my mail? ------------------------------------------------------- 3 Email size and storage limits -----------------------------------------------------------------------
More informationSome jobs are listed in local classified ads, like the ones found in the newspaper.
Online Classifieds Some jobs are listed in local classified ads, like the ones found in the newspaper. Newspapers have some of these ads available on their websites or in print. However, many people now
More informationBank of Hawaii Protecting Confidential . What's in this User Guide
1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, and financial information. By default, emails are sent
More informationHow to Enable Images to display in various client programs
How to Enable Images to display in various email client programs Images typically don't display in your email program unless you allow them to. To change your email program to accept images from your chapter,
More informationAnti-Spoofing. Inbound SPF Settings
Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging
More informationOutlook on the Web College of Lake County Professional Development Center Revised July 17, 2014
Outlook on the Web College of Lake County Professional Development Center Revised July 17, 2014 Checking E-Mail from Home Each faculty member is provided with an e-mail account. This account can be accessed
More informationCommunication. Identity
Mailock User guide OUR MISSION STATEMENT To Secure your Communication Data Identity Contents Introducing Mailock... 5 Business Users... 5 What do you need to run Mailock?... 5 In a browser... 5 On a mobile
More informationCreating An Account With Outlook
Creating An Email Account With Outlook In this lesson we will show you how to create an email account and go through some of the basic functionality of the account. Lesson 1: Accessing The Website and
More informationS a p m a m a n a d n d H a H m 성균관대학교 최형기
Spam and Ham 성균관대학교 최형기 Agenda Email Protocol Introduction to spam Techniques spammers use Kinds of spam Solutions to spam Conclusion CINS/F1-01 Sungkyunkwan University, Hyoung-Kee Choi 2 SMTP 1 Electronic
More informationRecommendations for Device Provisioning Security
Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic
More informationProofPoint Protection Perimeter Security Daily Digest and Configuration Guide. Faculty/Staff Guide
ProofPoint Email Protection Email Perimeter Security Daily Digest and Configuration Guide Faculty/Staff Guide Contents Introduction and ProofPoint Overview... 2 Daily Email Digest... 3 ProofPoint Portal
More informationSecurity and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web
Security and Privacy SWE 432, Fall 2016 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Privacy For further reading: https://www.owasp.org/index.php/
More informationInternet Architecture
Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use
More informationis still the most used Internet app. According to some studies around 85% of Internet users still use for communication.
1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a
More informationP2_L12 Web Security Page 1
P2_L12 Web Security Page 1 Reference: Computer Security by Stallings and Brown, Chapter (not specified) The web is an extension of our computing environment, because most of our daily tasks involve interaction
More informationE mail Setup Guide for Microsoft Outlook 2002, 2003 & 2007
E mail Setup Guide for Microsoft Outlook 2002, 2003 & 2007 Summary of Settings Incoming mail server (POP3): mail.everythinggraphic.com Outgoing mail server (SMTP): mail.everythinggraphic.com Important:
More informationGMAIL BEGINNERS GUIDE
GMAIL BEGINNERS GUIDE A Little History: The year is 2004 and three email services dominate the market. They were Hotmail, AOL and Yahoo mail. After extensive testing, Google decides to branch beyond being
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationUsing web-based
Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office
More informationCyber Security Guide. For Politicians and Political Parties
Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process
More informationUsing Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known).
Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known). If you do not currently have an email account please use the Creating an
More informationUser Manual of Webmail Version 5
User Manual of Webmail Version 5 English Version: 1.0 Page 1 of 13 TABLE OF CONTENTS 1. ACCESS...3 1.1 Accessing to Webmail 5...3 2. COMPOSE AND SEND E-MAIL MESSAGE...4 2.1 Composing a new E-mail message...4
More informationCreating and Using an Account
Creating and Using an Email Account How to get on the Internet Click two times very quickly (double click) on any of the following icons: These are called browsers. They are what you use to search the
More informationOWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP
OWASP Top 10 Risks Dean.Bushmiller@ExpandingSecurity.com Many thanks to Dave Wichers & OWASP My Mom I got on the email and did a google on my boy My boy works in this Internet thing He makes cyber cafes
More informationUsing Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
More informationAccount Set Up Guide
Email Account Set Up Guide January 08. Webmail. Desktop Clients. Mobile Setup Account Set Up Details The following details are needed to set up your email account in desktop clients or mobile devices.
More informationCommunication using
Lesson 7 A m In this lesson you will learn: How to communicate by using email. How to create email accounts. Communication using E-mail Tejas: Today we made a poster on Communication old and new. Tejas
More informationTo: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure
To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure email This memo describes how to use Proofpoint Encryption to send
More informationHigh-Speed Internet. Connection Guide
High-Speed Internet Connection Guide Welcome Welcome to Suddenlink High-Speed Internet Thank you for choosing Suddenlink as your source for quality home entertainment and communications! There is so much
More informationMain area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation
Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]
More informationATTACHMENTS, INSERTS, AND LINKS...
Conventions used in this document: Keyboard keys that must be pressed will be shown as Enter or Ctrl. Objects to be clicked on with the mouse will be shown as Icon or. Cross Reference Links will be shown
More informationHow Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong
How Enterprise Tackles Phishing Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong Hackers turning to easy marks - Social engineering Phishing was the #1 threat vector (> 50%) for Office
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationUsing WebQuarantine for Managing Quarantined Messages
Using WebQuarantine for Managing Quarantined Messages Logging In To start a new mail session: Open your Internet browser and to go the WebQuarantine login page, URL: http://spam.mmc.org/quarantine/login.aspx
More informationUsing the Control Panel
Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox
More informationAccounts and Passwords
Accounts and Passwords Hello, I m Kate and we re here to learn how to set up an account on a website. Many websites allow you to create a personal account. Your account will have its own username and password.
More informationAccessing Insurance Portal/PAS Job Aid Single Sign-On
Accessing Insurance Portal/PAS Job Aid Single Sign-On Getting Started with Insurance Portal and PAS - Create Desktop Shortcut and Single Sign-On Password Getting Started To Get Started with Insurance Portal
More informationAccessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message
WebMail Help User Manual Index Accessing WebMail Logging In Check your Mail Main Mail Screen Reading Messages Search Sending a new message Address book Spelling Attaching files Html Text Managing addresses
More informationGRCC Gmail. What is ? Logon and Accessing your GRCC
What is E-mail? Email is electronic mail and a method to exchange messages and files over a computer network. Instead of using a pen to write a letter on paper, you use a keyboard to type an email message.
More information56 Common Problems and Solutions
56 Common Email Problems and Solutions W W W. Q W E R T Y T S. C O M Uncopyright I hereby waive all claim of copyright in this work; it may be used or altered in any manner without attribution or notice
More informationExchange 2013 User Guide For Apple devices
Exchange 2013 User Guide For Apple devices Notes and pre-setup advice 3 Exchange 2013 differences 3 Ultra Quick start guide 3 Welcome to Exchange 2013 4 Welcome 4 About Exchange mailboxes 4 Getting Started
More informationHome/Network Computing
Home/Network Computing How to avoid becoming road kill on the Internet (Information Superhighway) Home Computing not as simple as it used to be almost all computers need to have sys-admin disk drives will
More informationAuthentication Methods
CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks
More informationWEBMAIL INTERFACE MANUAL GUIDE
WEBMAIL INTERFACE MANUAL GUIDE (Mobile Version) Mail Hosting Service 2016. All rights reserved. Power by Support Mail team (support mail@ntt.co.th) NTT Communications (Thailand) Co.,Ltd. Library of instructions
More informationJunk mail, aka Spam. Unsolicited messages that are sent in huge numbers and clog your box.
Gmail Basics, Part 1 Read, Respond, Write and Print What is E-mail? Electronic mail a message sent from one computer to another. Message typically contains text, but can also contain files, images, or
More informationEmptying the trash...18 Webmail Settings...19 Displayed Name...19 Sort by...19 Default font style...19 Service language...
Force9 Webmail 1 Table of Contents Guide Notes...4 About this guide...4 Contacting the author...4 Assumptions...4 Who should read this guide...4 Conventions used in this guide...5 Further Reading...5 Using
More informationObjectives CINS/F1-01
Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.
More informationCipherMail encryption. CipherMail white paper
CipherMail email encryption CipherMail white paper Copyright 2009-2017, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
More information