E-Mail Threats and Vulnerabilities
David Harley, NHS Connecting for Health, UK
Social and Antisocial E-Mail Issues
E-Mail and Early Viruses
Boot Sector Infectors
File and Boot (Multipartite) Viruses
Hybrid and Multipolar Malware
E-Mail Viruses and Worms
The Malware Author's Dilemma
Spam and Related E-Mail Abuse
Spam and Malware
Chain Letters, Chain E-Mails, and Hoaxes
Threats and Extortion
E-Mail Abuse and Policy-Based Solutions
Codes of Conduct
The classic information technology (IT) security tripod model (integrity, confidentiality, and availability) applies as much to e-mail as it does to other areas of information management, and the medium is subject to a range of problems. Johnson (2000) categorized these as follows:
- Eavesdropping. This exploits susceptibility to network sniffing and other breaches of confidentiality.
- Impersonation/identity theft. Even though well-managed organizations use authentication to regulate access to services, many e-mail-related Internet services such as SMTP (simple mail transfer protocol) are highly vulnerable to such abuses as impersonation by forging e-mail headers. Although identity theft is an ongoing problem, the less glamorous problem of ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.