TITLE

Encrypt that E-mail

AUTHOR(S)
Johnson, Nigel
PUB. DATE
March 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p64
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses various solutions for the security and privacy of electronic mails (e-mail). An e-mail assessment can provide quantifiable statistics on the number of messages in a mail stream and need to be sent securely. Content-filtering techniques may also be used. A vendor's solution may be based on several encryption methods or protocols.
ACCESSION #
20081147

 

Related Articles

  • Keeping e-mail secure: No easy chore. Rothman, Mike // Network World;02/28/2000, Vol. 17 Issue 9, p47 

    Looks at available options for securing electronic mail systems. Secure/Multipurpose Internet Mail Extensions format for message encryption and digital signature; Deployment of an electronic mail security gateway; Web-based secure mail services; Development of a directory of digital certificates.

  • Approach secure E-mail with eyes wide open. Sullivan, Eamonn // PC Week;09/01/97, Vol. 14 Issue 37, p32 

    Reports that the Secure Multipurpose Internet Mail Extension (S/MIME) protocol was rejected by the Internet Engineering Task Force as a standard for E-mail encryption. Why S/MIME was rejected; How the rejection impacts the Open Pretty Good Privacy (PGP) protocol; Where Open PGP is used; Why...

  • DKIM fights phishing and e-mail forgery. Libbey, Miles // Network World;8/8/2005, Vol. 22 Issue 31, p31 

    This article focuses on the DomainKeys Identified Mail (DKIM) e-mail authentication proposal that strengthens user protection from e-mail fraud. The objective of DKIM is to protect message sender identity and the integrity of the messages they convey while retaining the functionality of the...

  • Key uprising. Kerstetter, Jim // PC Week;09/29/97, Vol. 14 Issue 41, p1 

    Examines the debate over encryption in the United States in 1997. Possible legislation on the federal level which would maintain strict export controls and mandate government access to data; How the legislation would impact the way in which companies use the Internet to transport data; How...

  • Encrypt Stored Email. Geier, Eric // PCWorld;Aug2012, Vol. 30 Issue 8, p93 

    The article presents a step-by-step guide to encrypting email data on a mobile device like a smartphone or laptop.

  • Sealing the E-mail envelope. Rudich, Joe // Link-Up;May/Jun98, Vol. 15 Issue 3, p10 

    Presents electronic mail encryption tools for securing Internet communications. Methods of encryption; Features of some e-mail encrypting tools. INSET: Product information.

  • The study on end-to-end security for ubiquitous commerce. Hangbae Chang // Journal of Supercomputing;Feb2011, Vol. 55 Issue 2, p228 

    Traditional authentication systems used to protect access to online services are vulnerable by using various types of keyboard hacking tools at application-level and kernel-level. This study has been carried out for the purpose to secure keyboard input information at end to end area between the...

  • A Modified MD5 Algorithm for Wireless Networks. Santra, A. K.; Nagarajan, S. // International Journal of Advanced Research in Computer Science;Mar/Apr2012, Vol. 3 Issue 2, p292 

    The application of technological and related procedures to safeguard the security of various documents while moving on the channel is an important responsibility in electronic data systems. This paper specifies the modification of the MD5 which may organizations to protect sensitive data....

  • Straightforward steps to guard your network from risk of eavesdropping. King, Tom // Computer Weekly;4/8/2008, p12 

    The article suggests several steps to protect a network from the risks of eavesdropping. Lack of awareness of any security issue can be dangerous and information technology (IT) managers need to promote awareness and demonstrate good practice. Encryption is a great defence. Using applications...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics