Friday, February 14, 2020
Vulnerabilities Research Paper Example | Topics and Well Written Essays - 500 words
Vulnerabilities - Research Paper Example Certificate Authority (CA) and is considered to be the most efficient control in terms of email security (Ellison & Schneier, 2000). In case of secure email, one has to make sure about the sender possessing the key is the one who is the authentic sender. Likewise, when signed email is verified, one of the checks includes the source of the email i.e. the sender. However, if encryption is applied to the public key infrastructure, there is a requirement of identifying people possessing the relevant key to decrypt the message (Ellison & Schneier, 2000). This is the point where email certificates starts to operate, as the certificate ID is a digitally signed message from the CA that is transmitted to the user linked with the public key. However, the (PKI) possess many risks that may lead to vulnerabilities and in the end threats. One of the risks incorporates a breach of keys associated with the signer via unauthorized access or by any other means (Ellison & Schneier, 2000). However, efficient Certificate Authorities can mitigate risks by en effective physical security, personnel security and secure network. Pretty Go od Privacy ââ¬ËPGPââ¬â¢ counters these issues as well by incorporating ââ¬ËWeb of Trustââ¬â¢ including self-governing signatures linked with the single certificate (Ellison & Schneier, 2000). Moreover, for addressing internal security, monitoring of employee emails is a regulatory requirement. However, there are many procedures, tasks and functions associated with it. The requirements can be met by utilizing tools from outlook express that are capable of retrieving certain keywords used in the email. For example, the keyword ââ¬Ëaccountââ¬â¢ can retrieve all emails including this specific word. (Bhatnagar, 2012). However, these outlook tools only work individually on each workstation and can be solved by incorporating Microsoft Exchange server. As the server will retrieve all emails of all employees containing the specific
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.