smart email security
DESCRIPTION
It provides security from hackers.This paper suggests ways of providing security to emails from hackers.TRANSCRIPT
![Page 1: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/1.jpg)
SMART EMAIL SECURITY
UNDER THE GUIDANCE OF :
KUSUMA
PRESENTED BY : P.TEJASWINI – 11291A0583 P.AKHIL – 11291A0579
![Page 2: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/2.jpg)
CONTENTS
• ABSTRACT
• INTRODUCTION
• OVERVIEW OF E-MAIL SYSTEM
• COMMON VULNERABILITIES
• SECURITY REQUIREMENTS
• CLIENT BASED SOLUTIONS
• SERVER BASED SOLUTIONS
• AUTHENTICATION
• CONCLUSION
![Page 3: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/3.jpg)
ABSTRACT
• Electronic Mail is the most important application for
personal and business communication across the
Internet. People depend on it for sending text, image
and even sound files quickly to their destinations.
• This paper suggests ways of providing security to
emails from hackers.
![Page 4: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/4.jpg)
INTRODUCTION
• Electronic Mail is one of the most used tools
for business and personal communication in
the world today.
• Messages and Pictures can be sent quickly
from source to destination using E-Mail.
![Page 5: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/5.jpg)
• The senders assume that the contents are
private and are kept sealed from the source to
the Destination but malicious hackers and
spammers can read and send unauthorized E-
Mail information.
![Page 6: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/6.jpg)
• The heavy reliance on E-Mail makes the
proper security precautions to provide secure
and reliable E-Mail solutions.
![Page 7: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/7.jpg)
OVER VIEW OF E-MAIL SYSTEM
• The E-Mail process can be broken down into two
general parts, message sending and message
delivery.
• When a message is sent by a client it is received
by a server(SMTP) and delivered to the
destination.
![Page 8: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/8.jpg)
COMMON VULNERABILITIES
• There can be many opportunities for hackers to send
unauthorized messages, modify messages during
delivery.
• Messages that are sent in clear text can be easily
read if the mail delivery system is compromised.
![Page 9: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/9.jpg)
• Many of the problems that E-Mail users
encounter are related to the material contained in
messages that they receive.
• These sometimes include html formatted
messages, harmful attachments or other forms of
executable code.
![Page 10: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/10.jpg)
SECURITY REQUIREMENTS
The main security goals are as follows.
• The E-Mail services must be able to provide Non-
Repudiation and Encryption when necessary.
• A secure E-Mail system or client also must be able
to minimize the effects of spam and malware on the
systems that receive messages.
![Page 11: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/11.jpg)
CLIENT BASED SOLUTIONS
• E-Mail clients have traditionally used MIME for
formatting most messages that have multiple messages
embedded or for non-text based messages.
• The first encryption protocol is Pretty Good Privacy ,it is a
free encryption solution for encrypting E-Mail between
clients as many individuals need this type of service with
E-Mail protocol.
![Page 12: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/12.jpg)
SERVER BASED SOLUTIONS
•Server applications can provide
virus protection, spam filtering,
and even encryption.
![Page 13: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/13.jpg)
CONCLUSION
• To take advantage of its strengths, E-
Mail processes need to be reviewed
and updated as newer protocols and
technologies are developed.
![Page 14: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/14.jpg)
![Page 15: Smart Email Security](https://reader033.vdocuments.site/reader033/viewer/2022051401/55cf923a550346f57b94c248/html5/thumbnails/15.jpg)