scholarly journals Transparent Proxy for Secure E-Mail

2010 ◽  
Vol 61 (3) ◽  
pp. 183-188
Author(s):  
Juraj Michalák ◽  
Ladislav Hudec

Transparent Proxy for Secure E-MailThe paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

2020 ◽  
Vol 7 (3) ◽  
pp. 493
Author(s):  
Amrul Faruq ◽  
Khaeruddin Khaeruddin ◽  
Merinda Lestandy

<p class="Abstrak">Surat elektronik atau <em>email</em> merupakan media komunikasi yang sangat populer. Untuk mengirim dan menerima email, diperlukan sebuah penyedia <em>(server)</em> yang di dalamnya terdapat layanan <em>email</em>. <em>Zimbra Collaboration Suite (ZCS)</em> merupakan salah satu aplikasi <em>mail server powerfull</em> yang dapat dipergunakan sebagai aplikasi <em>mail</em> <em>server</em> dalam jumlah user puluhan hingga ribuan. Pada penelitian ini, sistem enkripsi pada Zimbra <em>multiple-mail</em> <em>server</em> menggunakan metode OpenPGP  diimplementasikan untuk mengamankan isi <em>email</em> yang dikirim maupun yang diterima, yaitu dengan memanfaatkan <em>public key</em> dan <em>private key</em>. Hasil pengujian menunjukkan metode <em>OpenPGP </em> mampu bekerja dengan baik untuk keamanan sistem pengiriman dan atau penerimaan <em>email</em> pada <em>multi mail server</em>.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstract"><em>Electronic mail or e-mail is a very popular communication medium. To send and receive e-mails, a provider (server) is needed in which there is an e-mail service. Zimbra Collaboration Suite (ZCS) is one powerful mail server application that can be used as a mail server application in the number of users from tens to thousands. In this study, the encryption system on the Zimbra multiple-mail server uses the OpenPGP  method to be implemented to secure the contents of e-mails sent and received, namely by using the public key and private key. The test results show that the OpenPGP  method works well for the security of the email sending/receiving system on a multi-mail server.</em></p>


2010 ◽  
Vol 20-23 ◽  
pp. 774-778
Author(s):  
Rui Ding ◽  
Yong Qin Hu ◽  
Wei Gong Zhang ◽  
Bo Yang

The characteristics and limitations of the buses, which are widely used nowadays, are analyzed in this paper. Because these buses don’t adapt to the high-reliability embedded computer system, a novel bus is proposed which is characterized by its high-reliability. And its capacity is reached through its unique datum’s dynamic reconfiguration mechanism. The basic architecture and communication protocol are presented in this paper. And then the key points during realization of this bus are discussed. Finally, the probably application scope and prospects are indicated.


2021 ◽  
pp. 8-17
Author(s):  
Amer Ramadan ◽  

This paper reports on an in-depth examination of the impact of the backing filesystems to Docker performance in the context of Linux container-based virtualization. The experimental design was a 3x3x4 arrangement, i.e., we considered three different numbers of Docker containers, three filesystems (Ext4, XFS and Btrfs), and four application workloads related to Web server I/O activity, e-mail server I/O activity, file server I/O activity and random file access I/O activity, respectively. The experimental results indicate that Ext4 is the most optimal filesystem, among the considered filesystems, for the considered experimental settings. In addition, the XFS filesystem is not suitable for workloads that are dominated by synchronous random write components (e.g., characteristical for mail workload), while the Btrfs filesystem is not suitable for workloads dominated by random write and sequential write components (e.g., file server workload).


E-mail system is one of the critical infrastructures of any organization. It is necessary to ensure that the mail servers in use should be secured in such a way that no security properties like confidentiality, integrity, and authenticity are compromised. To achieve these security properties we have setup a secure e-mail server testbed that provides security against malware and spam, and guaranties secure e-mail delivery. This paper proposes a secure methodology for filtering spam and malware in the e-mail system, comprising standard layers of protocols and policies. An experimental testbed is established to evaluate the effectiveness of our methodology and was tested with spam and malware e-mails. Our results showed an accuracy of 95 percent, against a typical configuration of an e-mail system.


Computer ◽  
1985 ◽  
Vol 18 (4) ◽  
pp. 67-70 ◽  
Author(s):  
White ◽  
Lavi

Author(s):  
Lei Chen ◽  
Wen-Chen Hu ◽  
Ming Yang ◽  
Lei Zhang

E-mail services are the method of sending and receiving electronic messages over communication networks. Web services on the other hand provide a channel of accessing interlinked hypermeida via the World Wide Web. As these two methods of network communications turn into the most popular services over the Internet, applied cryptography and secure authentication protocols become indispensable in securing confidential data over public networks. In this chapter, we first review a number of cryptographic ciphers widely used in secure communication protocols. We then discuss and compare the popular trust system Web of Trust, the certificate standard X.509, and the standard for public key systems Public Key Infrastructure (PKI). Two secure e-mail standards, OpenPGP and S/MIME, are examined and compared. The de facto standard cryptographic protocol for e-commerce, Secure Socket Layer (SSL) / Transport Layer Security (TLS), and XML Security Standards for secure web services are also discussed.


Author(s):  
James W. Ragucci ◽  
Stefan A. Robila

Fraudulent e-mails, known as phishing attacks, have brought chaos across the digital world causing billions of dollars of damage. These attacks are known for their ability to exploit the human aspect of a computer system by pretending to originate from a source trusted by the victim. While technology defenses have been setup for protection, people are still succumbing to these attacks at alarming rates. Therefore, educational techniques must implement to strengthen the human factor of security. We propose the use of a phishing IQ test that when used in classroom setting can help users build experience needed to identify phishing e-mail during their daily routine.


2020 ◽  
Vol 10 (1) ◽  
pp. 25-32
Author(s):  
Harun Mukhtar ◽  
Daniel Adi Putra Sitorus ◽  
Yulia Fatma

Mail server is one of the most widely used server functions in the company. This discusses e-mail itself which can reduce mailing costs, is more efficient than manual communication and can be used as attachments that are useful as a supplement and additional documents related to the contents of e-mail. Zimbra is a mail server application that provides complete features and also makes it easy to install mail server management, also mail server security issues are a factor that must be considered by the system administrator. The security design for e-mail servers addresses the importance of being able to prevent spam e-mail attacks that can fill e-mail servers and make mail server performance faster. Because a good mail server security can optimize the performance of the mail server itself. In this final project, the work and implementation of the zimbra mail server security will be carried out specifically for handling email spam. The zimbra email server will analyze its security against spam email attacks, so that it can function as an email server on the company.


Author(s):  
Indranil Bose

Phishing is a new form of online crime where the unsuspecting user is tricked into revealing his/her personal information. It is usually conducted using social engineering or technical deceit–based methods. The various ways in which phishing can take place are described in this chapter. This is followed by a description of key strategies that can be adopted for protection of end users and organizations. The end user protection strategies include desktop protection agents, password management tools, secure e-mail, simple and trusted browser setting, and digital signature. Among corporate protection strategies are such measures as e-mail personalization, mail server authentication, monitoring transaction logs, detecting unusual downloading activities, token based and multifactor authentication, domain monitoring, and Web poisoning. Some of the commercially available and popular anti-phishing products are also described in this chapter.


Sign in / Sign up

Export Citation Format

Share Document