TITLE

Encrypt that E-mail

AUTHOR(S)
Johnson, Nigel
PUB. DATE
March 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p64
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses various solutions for the security and privacy of electronic mails (e-mail). An e-mail assessment can provide quantifiable statistics on the number of messages in a mail stream and need to be sent securely. Content-filtering techniques may also be used. A vendor's solution may be based on several encryption methods or protocols.
ACCESSION #
20081147

 

Related Articles

  • Cloudsweeper Project Estimates Your Inbox's Worth to Criminals. Lemos, Robert // eWeek;7/ 5/2013, p2 

    The article reports on the Cloudsweeper project of researchers from the University of Illinois at Chicago, an online service which estimates the worth of a Gmail account on the black market through checking for sensitive information. The service looks for password-reset or account-recovery...

  • Key uprising. Kerstetter, Jim // PC Week;09/29/97, Vol. 14 Issue 41, p1 

    Examines the debate over encryption in the United States in 1997. Possible legislation on the federal level which would maintain strict export controls and mandate government access to data; How the legislation would impact the way in which companies use the Internet to transport data; How...

  • Getting a Lock on Patient Confidentiality With E-Mail Encryption. Hill, David B. // Family Practice Management;Oct2000, Vol. 7 Issue 9, p37 

    Discusses the use of encryption to secure patient information shared electronically with other physicians. Duplication of electronic messages; Availability of free encryption software; Downloading of a free version of Pretty Good Privacy encryption system.

  • The study on end-to-end security for ubiquitous commerce. Hangbae Chang // Journal of Supercomputing;Feb2011, Vol. 55 Issue 2, p228 

    Traditional authentication systems used to protect access to online services are vulnerable by using various types of keyboard hacking tools at application-level and kernel-level. This study has been carried out for the purpose to secure keyboard input information at end to end area between the...

  • Attribute-policy handshake for Remote User Authentication Scheme. Lijun Sang // International Journal of Digital Content Technology & its Applic;Dec2011, Vol. 5 Issue 12, p332 

    Authentication becomes an important part of network security, and biometrics is increasingly gaining popularity in security related applications. Remote server verifies the legitimacy of a user over an insecure communication channel in remote authentication. Recently, several biometric remote...

  • A Modified MD5 Algorithm for Wireless Networks. Santra, A. K.; Nagarajan, S. // International Journal of Advanced Research in Computer Science;Mar/Apr2012, Vol. 3 Issue 2, p292 

    The application of technological and related procedures to safeguard the security of various documents while moving on the channel is an important responsibility in electronic data systems. This paper specifies the modification of the MD5 which may organizations to protect sensitive data....

  • Straightforward steps to guard your network from risk of eavesdropping. King, Tom // Computer Weekly;4/8/2008, p12 

    The article suggests several steps to protect a network from the risks of eavesdropping. Lack of awareness of any security issue can be dangerous and information technology (IT) managers need to promote awareness and demonstrate good practice. Encryption is a great defence. Using applications...

  • Cryptographic routing protocol for secure distribution and multiparty negotiatiated access control. Kišasondi, Tonimir; Hutinski, Željko // Central European Conference on Information & Intelligent Systems;9/23/2009, p267 

    Standard key distribution protocols cannot distribute keys or content with respect to multi-party defined access rules or multi-party negotiated access or resource granting. Other possible requirements are full user anonymity or partial votes that grant access to a resource with respect to the...

  • Triple-Wrapped.  // Network Dictionary;2007, p497 

    A definition of the term "triple-wrapped" is presented. In Secure/Multipurpose Internet Mail Extensions (S/MIME), triple-wrapped refers to data that has been signed with a digital signature and then encrypted and then signed again.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics