O'Reilly logo

Windows Server® 2008 PKI and Certificate Security by Brian Komar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 22. Secure E-Mail

Many organizations use e-mail as a method of communication between employees and external customers. By default, Internet e-mail is sent without any encryption, exposing the e-mail content to any users that are able to capture the packets as they traverse the network.

This chapter looks at the public key infrastructure (PKI) requirements for protecting e-mail with cryptographic measures.

Securing E-Mail

Two different methods can be implemented to secure e-mail:

  • Securing the content of e-mail messages. The content of e-mail messages is secured by implementing Secure/Multipurpose Internet Mail Extensions (S/MIME).

    Note

    Note

    The design ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required