E-Mail Threats and Vulnerabilities
David Harley, NHS Connecting for Health, UK
Social and Antisocial E-Mail Issues
File and Boot (Multipartite) Viruses
Chain Letters, Chain E-Mails, and Hoaxes
E-Mail Abuse and Policy-Based Solutions
INTRODUCTION
The classic information technology (IT) security tripod model (integrity, confidentiality, and availability) applies as much to e-mail as it does to other areas of information management, and the medium is subject to a range of problems. Johnson (2000) categorized these as follows:
- Eavesdropping. This exploits susceptibility to network sniffing and other breaches of confidentiality.
- Impersonation/identity theft. Even though well-managed organizations use authentication to regulate access to services, many e-mail-related Internet services such as SMTP (simple mail transfer protocol) are highly vulnerable to such abuses as impersonation by forging e-mail headers. Although identity theft is an ongoing problem, the less glamorous problem of ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.