Security and Privacy

Size: px
Start display at page:

Download "Security and Privacy"

Transcription

1 Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila

2 1. Introduction Today there are millions of people in the world that use and many of them use free services offered on the Internet by several companies. is an integral part of our jobs in the workplace, but it is also plays an important role in our everyday lives outside of work. Many of us rely on these web-based services as a form of communication for financial transactions, job offers, and personal correspondence. Many of these webmail services ask you for some type of personal information when signing up for an account to prove who you are and also to be used as verification if you should ever forget your password. We think that our is secure because we have to input a password to access it. But how secure is our really and how secure is our account information? We will set out to find out just how well companies such as Google, Yahoo, and Microsoft protect our account information. While we would all like to think that our information is being kept really secure in this advanced technological society, it is really not as safe we assume it is. We are all increasingly using our to communicate personal information and financial transactions and hackers know that as well. With that, they will stop at nothing to try to gain access into as many accounts as possible for personal gain. They are always changing their method of attack and some of these companies providing webmail services have not been able to implement security policies properly to counter these attacks. Security and Privacy 2

3 2. How Webmail Works Webmail is not too different from regular . In fact, you could think of webmail as a special type of . Unlike regular , you do not access your account using a program on your computer such as Outlook or Thunderbird. Instead, you access your account from a website, which then gives you a web interface to your . No messages are stored physically on your computer, so you do not have access to them while you are offline. However, similar to regular , all of your messages are stored on a server owned by the host. Whenever you compose a message from within the web interface, you are essentially communicating with that mail server. Your sent message goes from your computer to the outgoing mail server. The message then gets transmitted to another server that holds the recipient s messages. Figure 1: How gets sent and received 1 The recipient is able to view the message once they log in to their from a computer. They can then read the message and reply to it, if they so choose. Replying to an message involves the same process as sending an . Security and Privacy 3

4 3. Accessing Webmail Accounts In order for a person to get access to their web based , they must first log in to the system. This is done by visiting the host s webpage and entering your username and password (E.g. mail.yahoo.com, hotmail.com, gmail.com). Most people who know are technologically adept know that the standard HTTP protocol is not a safe way of transmitting log in credentials such as usernames and passwords. Yet, we are still faced with the dilemma of how to log in to our webmail securely 2. Most companies who provide web based present their log in page to you in HTTPS. This means that they are using Secure Socket Layer (SSL) technology to encrypt your username and password before it is sent over the internet to their server Securely Accessing Webmail In order to securely log in to on the internet, your username and password must be encrypted before being sent to a server to verify that you can access the specified account. Both Yahoo! and Google redirect their log in pages to ones that are using SSL. It doesn t matter if you only entered the URL using the HTTP protocol, the page will redirect it to the HTTPS protocol. This is at least the minimum that should be required of free webmail providers. Microsoft, however, does not quite understand this concept just yet. Their login page for webmail services is still a default HTTP protocol with no encryption. The option to have your addressed remembered on the specific computer is even checked so a cookie with your address is stored on the computer automatically unless you uncheck it. There is an option however, for you to login to Microsoft securely, however, you must click and choose that option. For many users of , they will just type the URL of the page and log in, not knowing whether or not it is secure. There should be no reason why login pages are still using the HTTP protocol, especially when there have been increasingly reported attempts at hackers stealing account information and using them to either spam people or to gain access to someone s account at a financial institution. The fact that Microsoft s login page is not secure puts into question how well and how committed Microsoft is to protecting your information. Security and Privacy 4

5 Figure 2: Microsoft Insecure Login 4. Gaining Access Without a Password Because webmail is not an system hosted in a corporate business culture, resetting a password is not as simple a making a phone call to your IT administrator. Most webmail services will provide you with some way to reset your password in case you have forgotten it. However, others who wish to access your account can also use these tools to do so. Microsoft and Yahoo! ask you for your address and then ask you a few questions before you can reset your password. Questions ask your postal code, birth date, and Microsoft adds a security question that you chose when you signed up. If someone knows you well or at least your location information, they can easily gain access into your account and reset your password. In order to make this more secure, Yahoo! and Microsoft should set the first option to send an to the person s secondary address with a link to reset their password. Google s GMail is Security and Privacy 5

6 pretty secure in this aspect because the first thing it does is send an to your secondary e- mail address. If you do not have a secondary address, then you must go for 24 hours without any activity on your account before they present you with the security question that you chose when you signed up for the account. This poses a significant obstacle to hackers or others that want to access your account with malicious intent. 5. Content Security Many of us would like for our providers to provide a level of security where our messages are protected from outsiders and also where we are protected from s that contain malicious content Sending We care about the security and protection of our usernames and passwords for our accounts, but not many of us worry about the security of the content in our s. We expect or assume that just works and only the person the message was addressed to will be able to read it. This is true if you encrypt your messages before sending them using an client such as Outlook or Thunderbird. What security do webmail providers give us in terms of ensuring our is secure? In reality, they do not offer anything more or less than what a desktop client offers, which is not much. Most s you send are sent over the internet unencrypted. This means that anyone or any computer that your message travels through can intercept and read the contents of your message. This is a wake up call for many users because they do not often think about the inner workings of an system; they just expect it to work and deliver the message to where it is supposed to go. While Yahoo! and Microsoft may have secure login pages for their users, they do not offer much in terms of security once the user is actually logged in. After users have logged in, they access their account and inbox features through the normal HTTP protocol without any security. This poses many threats for the individual user because anyone that is using a packet sniffer can easily grab the information being sent over the network and read it. This poses one additional risk against users because if anyone is specifically targeting them with a packet sniffer and they do not encrypt outbound s, then the attacker can gain a plethora of information without really trying. Security and Privacy 6

7 Google s GMail service however, does not have this same problem that Microsoft and Yahoo! have. Google can be set to automatically ensure that a user s session (period of time they are logged in) is transmitted over the internet using SSL. This means that the entire connection between Google s mail server and the user s computer is encrypted. Every action taken, including deletion, composing, and sending are encrypted before being sent back over the network to Google s servers. This makes their system a little more secure. It prevents or at least deters attackers from being able to sniff out any worthwhile information from your internet packets. They can however, still intercept packets, but they cannot do anything with those packets unless they have the key to decrypt them. End user s however, should not take this as Google encrypting their completely. They should understand that it is only encrypted until it gets to Google s servers. Once it leaves Google s servers to be delivered to the destination provider, the contents of the can once again be intercepted and read easily by anyone. Figure 3: Gmail Session in HTTPS Security and Privacy 7

8 5.2. Encryption of While many s can be signed and encrypted on desktop clients using methods such as S/MIME and PGP, encrypting webmail is a much more difficult process. Using certificates with S/MIME is sometimes considered to be not suited for webmail 3. PGP is now proprietary software, however there is an open-source version available called GnuPG. Using an encryption technique like GnuPG is great when you have a desktop client because GnuPG is a command-line tool. You can encrypt the on your computer before sending it. With webmail however, you are composing a message in a web browser, so the message is not really on your computer. With this, there come complications in encrypting the messages you send. Encryption of even on desktop clients is not an easy task, much less encrypting webmail messages. It is a complex process which deters many users from implementing it. However with a tutorial online to walk those through it and a Firefox browser extension (FireGPG), users can begin to encrypt their web-based messages in no time 4. These tools are freely available and do not actually take very long to set up. Figure 4: FireGPG courtesy of Crunchgear.com 4 Security and Privacy 8

9 5.3. Receiving Users of free web-based systems have come to expect built-in spam filters. Users demand now that these filters work right off the bat without them having to make any customizations. For the most part these spam filters do what they are supposed to do and send spam and phishing messages to the junk folder. There is the occasional slip up however that gets past the filters and makes it into your inbox. What happens if a user was to accidentally click on one of these messages and there were malicious content hidden within the ? The good thing is that most web based providers now automatically block dynamic HTML content and graphics in s when you first open them. These content providers have a vested interest in protecting their user s computers from becoming infected because it then reduces the number of other users on their network that are infected. What about spoofed s? What are spoofed s? Spoofed s are messages that arrive in your inbox that claim they are sent from someone when they are in reality not. For example, an can arrive in your inbox and claim that you sent it to yourself, but in reality it was sent by someone else. Assuming your account has not been compromised, this is a prime example of a spoofed . Because of attacks like this and phishing scams, Google, Yahoo, and Microsoft have all implemented technologies into their systems to verify a sender. Yahoo! and Google have implemented a technology called DKIM (DomainKeys Identified Mail) 5. DKIM allows the sender or sending organization vouch for the authenticity of their s while they are being sent over the internet. The reputation of the company will determine whether the message is trusted for delivery or not 5. DKIM basically allows for a sender to digitally sign their s and verify that they are legitimate. For example, EBay currently has implemented DKIM and uses it on all of their outgoing s. Because of this, when legitimate EBay s are sent to Yahoo accounts, they are actually delivered, whereas fake EBay s are denied delivery and never make it to your account. We will see however, that this works most of the time, but there are instances where this fails. Security and Privacy 9

10 Example of DKIM Failure Figure 5: Attempt to get past DKIM The screenshot above is from the free webmail service, Fastmail.fm. It allows you to add a From address that you want to have your s sent from. This feature is available on all clients; however, you must first verify that the you are trying to use belongs to you. Fastmail, however, requires no such verification and as such, you can make an look like it came from an address that does not belong to you. With this, I wanted to test to see if DKIM would catch the fact that the was not really coming from the same account it was being addressed to. Figure 6: Forged arrives in Inbox without problems Security and Privacy 10

11 Figure 7: Header of preceding As you can see, the forged that I sent arrived in the inbox without any problems. I have even included the header of the message to prove that I did not send that message to myself from within Yahoo Mail. I can only assume that this happens because Yahoo s DKIM service is fooled into thinking this actually came from yahoo.com. This does not only happen for Yahoo Mail, it happens for Google s Gmail as well because they both use DKIM technology. Hotmail does not use DKIM, but instead use their own technology called Sender ID to verify a sender of an message 6. What will happen when we repeat this experiment, but send it to a Hotmail address instead? Security and Privacy 11

12 Figure 8: Forged in Junk Mailbox Figure 9: Header for preceding Security and Privacy 12

13 As you can see, the was immediately sent to the Junk folder of Hotmail and the content was even blocked automatically and you could not see the message until you specifically allowed it. This is a great security measure implemented by Hotmail and it helps protect its users from spoofed s. 6. Conclusion is used by many people today as one of their main forms of communication. Many of those users also like to be able to access their from wherever they are without having to carry around their own computer. As such, it is imperative that web-based providers offer their users plenty of security measures. They should protect their users from account hijacks and also protect the information that is in a user s account, content included. While encryption of s may take too many resources to be correctly implemented in a webmail system, the content providers should at least provide an easily accessible tutorial for their users to follow should they want to implement encryption on their own. With the exception of Google, providers still have a ways to go in making sure that it is as difficult as possible for someone to hijack another user s account. is a great resource and it would be beneficial for many if these webmail providers would offer more in terms of security and privacy for their users. Security and Privacy 13

14 References 1. How Works < 2. New Tool Automates Webmail Account Hijacks < ml> 3. Obstacles to Deploying S/MIME < 4. How to Protect your Webmail with GnuPG and FireGPG < 5. DomainKeys Identified Mail < 6. Sender ID < 7. Pfleeger, C. and Pfleeger, S., Security in Computing, 4 th Edition. 8. Webmail Security: Best Practices for Data Protection < Security and Privacy 14

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Secure Recipient Guide

Secure  Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

Introduction to

Introduction to Introduction to Email Overview 1. What is Email?... 2 2. Creating an Email Account... 3 3. Managing Messages... 8 4. Sending and Replying to Emails... 9 5. Signing Out... 15 519-579-3800 * ConnectKW@waterlooregion.org

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

Security Using Digital Signatures & Encryption

Security Using Digital Signatures & Encryption Email Security Using Digital Signatures & Encryption CONTENTS. Introduction The Need for Email Security Digital Signatures & Encryption 101 Digital Signatures & Encryption in Action Selecting the Right

More information

Computer Basics 4 Basics Revision 3 ( )

Computer Basics 4  Basics Revision 3 ( ) Computer Basics 4 E-mail Basics Revision 3 (1-10-2014) E-MAIL E-mail or electronic mail allows you to send and receive messages from anyone in the world with an e-mail address. To access e-mail you need

More information

USER GUIDELINES. Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?

USER GUIDELINES. Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password? USER GUIDELINES Revision 1.8 20 August, 2015 Q 1. How can I log into my webmail? Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?

More information

Spam Protection Guide

Spam  Protection Guide Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed

More information

My The guide.

My  The guide. My email The guide Read our Blog: http://.co.uk/blog View our support site: http://123-reg.co.uk/support Follow us on Twitter: https://twitter.com/123reg Contents 1. How do I get my own personalised email

More information

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired... WEB MESSAGE CENTER END USER GUIDE The Secure Web Message Center allows users to access and send and receive secure messages via any browser on a computer, tablet or other mobile devices. Introduction...

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Your message is sent from your computer to a server (like the post office) where the

Your message is sent from your computer to a server (like the post office) where the E-mail it s convenient, cheap and easy. Today, it is the most rapidly growing means of communication. All e-mail programs are slightly different. Gmail, Hotmail, and Yahoo! are some popular e-mail programs.

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

Introduction to SSL. Copyright 2005 by Sericon Technology Inc.

Introduction to SSL. Copyright 2005 by Sericon Technology Inc. Introduction to SSL The cornerstone of e-commerce is a Web site s ability to prevent eavesdropping on data transmitted to and from its site. Without this, consumers would justifiably be afraid to enter

More information

Welcome to the world of .

Welcome to the world of  . Welcome to the world of e-mail. E-mail, short for electronic mail, allows computer users to easily send messages back and forth between acquaintances around the world. There are a variety of ways to do

More information

Workshop. Part 1: Creating your account. 1) In the top search bar, type in gmail.com 2) Click on create account

Workshop. Part 1: Creating your account. 1) In the top search bar, type in gmail.com 2) Click on create account Email Workshop Purpose: The purpose of this class is to guide you through creating your own email account, and introduce you to the basic functions of your account. This packet will assist you with the

More information

Contents. Management. Client. Choosing One 1/20/17

Contents.  Management.  Client. Choosing One 1/20/17 Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,

More information

Basics. Prepared by Christine Anning June 2011 Modified by Emilie Hanson March 2012

Basics. Prepared by Christine Anning June 2011 Modified by Emilie Hanson March 2012 Computer Basics Handouts: Email Basics Prepared by Christine Anning June 2011 Modified by Emilie Hanson March 2012 St. Catherine University, MLIS Department 2004 Randolph Ave, St Paul MN 55105 www.stkate.edu/academic/mlis/

More information

How to Stay Safe on Public Wi-Fi Networks

How to Stay Safe on Public Wi-Fi Networks How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi

More information

The Activist Guide to Secure Communication on the Internet. Introduction

The Activist Guide to Secure Communication on the Internet. Introduction The Activist Guide to Secure Communication on the Internet Posted by: The Militant Posted on: September 3rd 2008 Updated on: September 8th 2008 Introduction 1 - Secure Internet Access 1.1 - Internet Cafes

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

User Manual Documentation

User Manual Documentation User Manual Documentation Overview Dated: 10 th February 2018 Webmail is essentially using a web browser, such as Internet Explorer or Firefox, to access your Email account. The advantages of such a system

More information

Computer Foundation Skills. Internet Webmail

Computer Foundation Skills. Internet Webmail Computer Foundation Skills Internet Webmail Table of Contents Contents Webmail... 4 Gmail Create an account... 5 Gmail - Passwords... 6 Gmail - Inbox... 7 Gmail View message... 7 Gmail Compose mail...

More information

Cyber Security Guide for NHSmail

Cyber Security Guide for NHSmail Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Guidance for sending and receiving an encrypted NHSmail

Guidance for sending and receiving an encrypted NHSmail Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted

More information

Basics. Setting up an Account. Inbox. Your inbox is your starting place when you open your . Your inbox contains all the s that have

Basics. Setting up an Account. Inbox. Your inbox is your starting place when you open your  . Your inbox contains all the  s that have Email Basics Welcome to Email Basics. Today we will be covering how to send an email, how to add attachments, how to reply or forward an email, and how to use the different folders in your email account.

More information

User Manual Version

User Manual Version User Manual Version 14.5.3 Contents KeyHelp User - Manual Contents 1. The current KeyHelp 4 1.1. KeyHelp Version 14...4 1.2. Finding a fault and being stuck with it?...4 1.3. Who is this manual for?...4

More information

Accessing Encrypted s Guide for Non-NHSmail users

Accessing Encrypted  s Guide for Non-NHSmail users Accessing Encrypted Emails Guide for Non-NHSmail users April 2017 Version 2.1 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental

More information

Choic Anti-Spam Quick Start Guide

Choic Anti-Spam Quick Start Guide ChoiceMail Anti-Spam Quick Start Guide 2005 Version 3.x Welcome to ChoiceMail Welcome to ChoiceMail Enterprise, the most effective anti-spam protection available. This guide will show you how to set up

More information

Web Security, Summer Term 2012

Web Security, Summer Term 2012 IIG University of Freiburg Web Security, Summer Term 2012 Brocken Authentication and Session Management Dr. E. Benoist Sommer Semester Web Security, Summer Term 2012 7 Broken Authentication and Session

More information

Web Security, Summer Term 2012

Web Security, Summer Term 2012 Table of Contents IIG University of Freiburg Web Security, Summer Term 2012 Brocken Authentication and Session Management Dr. E. Benoist Sommer Semester Introduction Examples of Attacks Brute Force Session

More information

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India Email Security PGP / Pretty Good Privacy SANOGXXX 10-18 July, 2017 Gurgaon, Haryana, India Issue Date: [31-12-2015] Revision: [V.1] Security issues for E-mail Confidentiality Network admin can read your

More information

Recipient USER GUIDE

Recipient USER GUIDE Recipient USER GUIDE General Information What is smartmail? smartmail is smartview s proprietary email encryption system used to protect your personal and transaction related information. What is smartportal?

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Internet and  Mini.K.G Senior Scientist, FRAD, CMFRI Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

Manually Create Phishing Page For Facebook 2014

Manually Create Phishing Page For Facebook 2014 Manually Create Phishing Page For Facebook 2014 While you are creating phishing page manually you have to do a lot of work Web Templates -- For importing premade template for Gmail, Facebook from SET.

More information

Life After Webmail Reference Guide

Life After Webmail Reference Guide Life After Webmail Reference Guide (An Introduction to Outlook Web Access 2007 Client User Interface) https://owa.wiu.k12.pa.us Westmoreland Intermediate Unit Information Technology Services 102 Equity

More information

Thunderbird IMAP Instructions Bloomsburg University Students

Thunderbird IMAP Instructions Bloomsburg University Students This guide will assist you in setting up Thunderbird to work with your student email account using IMAP. Thunderbird is a free multi platform email client available from Mozilla at http://www.mozillamessaging.com/.

More information

Using BBC Raw

Using  BBC Raw Electronic mail, or email is a quick way of sending messages to people using the internet. As with a postal address, an email address is made up of different parts, for example: tom@bbc.co.uk tom is your

More information

Electronic mail, or is a quick way of sending messages to people using the internet.

Electronic mail, or  is a quick way of sending messages to people using the internet. Using email Electronic mail, or email is a quick way of sending messages to people using the internet. As with a postal address, an email address is made up of different parts, for example: tom@bbc.co.uk

More information

SECTION 5 USING STUDENT

SECTION 5 USING STUDENT SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling

More information

On the Surface. Security Datasheet. Security Datasheet

On the Surface.  Security Datasheet.  Security Datasheet Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record

More information

Sectigo Security Solution

Sectigo  Security Solution Sectigo Email Security Solution 2018 Sectigo. All rights reserved. Email hacking is a commonly used malicious tactic in our increasingly connected world. Business email compromise (BEC), or email account

More information

Introduction. Logging in. WebQuarantine User Guide

Introduction. Logging in. WebQuarantine User Guide Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine

More information

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

DOWNLOAD PDF OUTLOOK EXPRESS CONFIGURATION STEPS

DOWNLOAD PDF OUTLOOK EXPRESS CONFIGURATION STEPS Chapter 1 : How To Setup Outlook Express Email - Email Support Edit Article How to Configure Outlook Express. In this Article: Determining Which Server to Use Configuring Outlook Express Client Community

More information

Binarytech Digital Education Karta Allahabad ( Notes)

Binarytech Digital Education Karta Allahabad ( Notes) Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail

More information

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging

More information

An Overview of Webmail

An Overview of Webmail An Overview of Webmail Table of Contents What browsers can I use to view my mail? ------------------------------------------------------- 3 Email size and storage limits -----------------------------------------------------------------------

More information

Some jobs are listed in local classified ads, like the ones found in the newspaper.

Some jobs are listed in local classified ads, like the ones found in the newspaper. Online Classifieds Some jobs are listed in local classified ads, like the ones found in the newspaper. Newspapers have some of these ads available on their websites or in print. However, many people now

More information

Bank of Hawaii Protecting Confidential . What's in this User Guide

Bank of Hawaii Protecting Confidential  . What's in this User Guide 1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, and financial information. By default, emails are sent

More information

How to Enable Images to display in various client programs

How to Enable Images to display in various  client programs How to Enable Images to display in various email client programs Images typically don't display in your email program unless you allow them to. To change your email program to accept images from your chapter,

More information

Anti-Spoofing. Inbound SPF Settings

Anti-Spoofing. Inbound SPF Settings Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging

More information

Outlook on the Web College of Lake County Professional Development Center Revised July 17, 2014

Outlook on the Web College of Lake County Professional Development Center Revised July 17, 2014 Outlook on the Web College of Lake County Professional Development Center Revised July 17, 2014 Checking E-Mail from Home Each faculty member is provided with an e-mail account. This account can be accessed

More information

Communication. Identity

Communication. Identity Mailock User guide OUR MISSION STATEMENT To Secure your Communication Data Identity Contents Introducing Mailock... 5 Business Users... 5 What do you need to run Mailock?... 5 In a browser... 5 On a mobile

More information

Creating An Account With Outlook

Creating An  Account With Outlook Creating An Email Account With Outlook In this lesson we will show you how to create an email account and go through some of the basic functionality of the account. Lesson 1: Accessing The Website and

More information

S a p m a m a n a d n d H a H m 성균관대학교 최형기

S a p m a m a n a d n d H a H m 성균관대학교 최형기 Spam and Ham 성균관대학교 최형기 Agenda Email Protocol Introduction to spam Techniques spammers use Kinds of spam Solutions to spam Conclusion CINS/F1-01 Sungkyunkwan University, Hyoung-Kee Choi 2 SMTP 1 Electronic

More information

Recommendations for Device Provisioning Security

Recommendations for Device Provisioning Security Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic

More information

ProofPoint Protection Perimeter Security Daily Digest and Configuration Guide. Faculty/Staff Guide

ProofPoint  Protection  Perimeter Security Daily Digest and Configuration Guide. Faculty/Staff Guide ProofPoint Email Protection Email Perimeter Security Daily Digest and Configuration Guide Faculty/Staff Guide Contents Introduction and ProofPoint Overview... 2 Daily Email Digest... 3 ProofPoint Portal

More information

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web Security and Privacy SWE 432, Fall 2016 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Privacy For further reading: https://www.owasp.org/index.php/

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

P2_L12 Web Security Page 1

P2_L12 Web Security Page 1 P2_L12 Web Security Page 1 Reference: Computer Security by Stallings and Brown, Chapter (not specified) The web is an extension of our computing environment, because most of our daily tasks involve interaction

More information

E mail Setup Guide for Microsoft Outlook 2002, 2003 & 2007

E mail Setup Guide for Microsoft Outlook 2002, 2003 & 2007 E mail Setup Guide for Microsoft Outlook 2002, 2003 & 2007 Summary of Settings Incoming mail server (POP3): mail.everythinggraphic.com Outgoing mail server (SMTP): mail.everythinggraphic.com Important:

More information

GMAIL BEGINNERS GUIDE

GMAIL BEGINNERS GUIDE GMAIL BEGINNERS GUIDE A Little History: The year is 2004 and three email services dominate the market. They were Hotmail, AOL and Yahoo mail. After extensive testing, Google decides to branch beyond being

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Using web-based

Using web-based Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known).

Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known). Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known). If you do not currently have an email account please use the Creating an

More information

User Manual of Webmail Version 5

User Manual of Webmail Version 5 User Manual of Webmail Version 5 English Version: 1.0 Page 1 of 13 TABLE OF CONTENTS 1. ACCESS...3 1.1 Accessing to Webmail 5...3 2. COMPOSE AND SEND E-MAIL MESSAGE...4 2.1 Composing a new E-mail message...4

More information

Creating and Using an Account

Creating and Using an  Account Creating and Using an Email Account How to get on the Internet Click two times very quickly (double click) on any of the following icons: These are called browsers. They are what you use to search the

More information

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP OWASP Top 10 Risks Dean.Bushmiller@ExpandingSecurity.com Many thanks to Dave Wichers & OWASP My Mom I got on the email and did a google on my boy My boy works in this Internet thing He makes cyber cafes

More information

Using Your New Webmail

Using Your New Webmail Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...

More information

Account Set Up Guide

Account Set Up Guide Email Account Set Up Guide January 08. Webmail. Desktop Clients. Mobile Setup Account Set Up Details The following details are needed to set up your email account in desktop clients or mobile devices.

More information

Communication using

Communication using Lesson 7 A m In this lesson you will learn: How to communicate by using email. How to create email accounts. Communication using E-mail Tejas: Today we made a poster on Communication old and new. Tejas

More information

To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure

To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure email This memo describes how to use Proofpoint Encryption to send

More information

High-Speed Internet. Connection Guide

High-Speed Internet. Connection Guide High-Speed Internet Connection Guide Welcome Welcome to Suddenlink High-Speed Internet Thank you for choosing Suddenlink as your source for quality home entertainment and communications! There is so much

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

ATTACHMENTS, INSERTS, AND LINKS...

ATTACHMENTS, INSERTS, AND LINKS... Conventions used in this document: Keyboard keys that must be pressed will be shown as Enter or Ctrl. Objects to be clicked on with the mouse will be shown as Icon or. Cross Reference Links will be shown

More information

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong How Enterprise Tackles Phishing Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong Hackers turning to easy marks - Social engineering Phishing was the #1 threat vector (> 50%) for Office

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

Using WebQuarantine for Managing Quarantined Messages

Using WebQuarantine for Managing Quarantined Messages Using WebQuarantine for Managing Quarantined Messages Logging In To start a new mail session: Open your Internet browser and to go the WebQuarantine login page, URL: http://spam.mmc.org/quarantine/login.aspx

More information

Using the Control Panel

Using the Control Panel Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox

More information

Accounts and Passwords

Accounts and Passwords Accounts and Passwords Hello, I m Kate and we re here to learn how to set up an account on a website. Many websites allow you to create a personal account. Your account will have its own username and password.

More information

Accessing Insurance Portal/PAS Job Aid Single Sign-On

Accessing Insurance Portal/PAS Job Aid Single Sign-On Accessing Insurance Portal/PAS Job Aid Single Sign-On Getting Started with Insurance Portal and PAS - Create Desktop Shortcut and Single Sign-On Password Getting Started To Get Started with Insurance Portal

More information

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message WebMail Help User Manual Index Accessing WebMail Logging In Check your Mail Main Mail Screen Reading Messages Search Sending a new message Address book Spelling Attaching files Html Text Managing addresses

More information

GRCC Gmail. What is ? Logon and Accessing your GRCC

GRCC Gmail. What is  ? Logon and Accessing your GRCC What is E-mail? Email is electronic mail and a method to exchange messages and files over a computer network. Instead of using a pen to write a letter on paper, you use a keyboard to type an email message.

More information

56 Common Problems and Solutions

56 Common  Problems and Solutions 56 Common Email Problems and Solutions W W W. Q W E R T Y T S. C O M Uncopyright I hereby waive all claim of copyright in this work; it may be used or altered in any manner without attribution or notice

More information

Exchange 2013 User Guide For Apple devices

Exchange 2013 User Guide For Apple devices Exchange 2013 User Guide For Apple devices Notes and pre-setup advice 3 Exchange 2013 differences 3 Ultra Quick start guide 3 Welcome to Exchange 2013 4 Welcome 4 About Exchange mailboxes 4 Getting Started

More information

Home/Network Computing

Home/Network Computing Home/Network Computing How to avoid becoming road kill on the Internet (Information Superhighway) Home Computing not as simple as it used to be almost all computers need to have sys-admin disk drives will

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

WEBMAIL INTERFACE MANUAL GUIDE

WEBMAIL INTERFACE MANUAL GUIDE WEBMAIL INTERFACE MANUAL GUIDE (Mobile Version) Mail Hosting Service 2016. All rights reserved. Power by Support Mail team (support mail@ntt.co.th) NTT Communications (Thailand) Co.,Ltd. Library of instructions

More information

Junk mail, aka Spam. Unsolicited messages that are sent in huge numbers and clog your box.

Junk mail, aka Spam. Unsolicited  messages that are sent in huge numbers and clog your  box. Gmail Basics, Part 1 Read, Respond, Write and Print What is E-mail? Electronic mail a message sent from one computer to another. Message typically contains text, but can also contain files, images, or

More information

Emptying the trash...18 Webmail Settings...19 Displayed Name...19 Sort by...19 Default font style...19 Service language...

Emptying the trash...18 Webmail Settings...19 Displayed Name...19 Sort  by...19 Default font style...19 Service language... Force9 Webmail 1 Table of Contents Guide Notes...4 About this guide...4 Contacting the author...4 Assumptions...4 Who should read this guide...4 Conventions used in this guide...5 Further Reading...5 Using

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

CipherMail encryption. CipherMail white paper

CipherMail  encryption. CipherMail white paper CipherMail email encryption CipherMail white paper Copyright 2009-2017, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information