Keeping e-mail secure: No easy chore

Rothman, Mike
February 2000
Network World;02/28/2000, Vol. 17 Issue 9, p47
Trade Publication
Looks at available options for securing electronic mail systems. Secure/Multipurpose Internet Mail Extensions format for message encryption and digital signature; Deployment of an electronic mail security gateway; Web-based secure mail services; Development of a directory of digital certificates.


Related Articles

  • DKIM fights phishing and e-mail forgery. Libbey, Miles // Network World;8/8/2005, Vol. 22 Issue 31, p31 

    This article focuses on the DomainKeys Identified Mail (DKIM) e-mail authentication proposal that strengthens user protection from e-mail fraud. The objective of DKIM is to protect message sender identity and the integrity of the messages they convey while retaining the functionality of the...

  • Encrypt Stored Email. Geier, Eric // PCWorld;Aug2012, Vol. 30 Issue 8, p93 

    The article presents a step-by-step guide to encrypting email data on a mobile device like a smartphone or laptop.

  • Sealing the E-mail envelope. Rudich, Joe // Link-Up;May/Jun98, Vol. 15 Issue 3, p10 

    Presents electronic mail encryption tools for securing Internet communications. Methods of encryption; Features of some e-mail encrypting tools. INSET: Product information.

  • Encryption, key recovery, and commercial trade secret assets: A proposed legislative model. Soma, John T.; Henderson, Charles P. // Rutgers Computer & Technology Law Journal;1999, Vol. 25 Issue 1, p97 

    Focuses on the technical, business and legal concerns of encryption in the United States. Development of cryptology techniques; Laws governing cryptosystems; Role of key recovery in trade secret and corporate communication protection; Commercial, law enforcement and national security interests...

  • Cracking a code is just one way to break it. Coffee, Peter // PC Week;05/26/97, Vol. 14 Issue 21, p61 

    Opinion. Informs that advanced encryption techniques leave unaddressed various ways to gain access to privileged data. Areas of network computing left unprotected by encryption schemes; Ways to gain access to data through key entry; Other ways to gain access to data.

  • Cryptography users fail key test. Fisher, Dennis // eWeek;08/21/2000, Vol. 17 Issue 34, p20 

    Focuses on the report `Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0,' by Alma Whitten and J.D. Tygar. Perception that public-key cryptography is difficult to use; Lack of understanding of public/private keys; How Pretty Good Privacy (PGP) is beyond the understanding of most...

  • SAFE PASSAGE. Harreld, Heather // Network World;08/28/2000, Vol. 17 Issue 35, p44 

    Focuses on electronic mail security service providers, which protect a company's sensitive messages from being read by electronic eavesdroppers. Convenience store chain 7-Eleven's use of ZixMail.com's ZixIT service to protect its corporate e-mail; Projected growth of e-mail boxes from 1999 to...

  • Approach secure E-mail with eyes wide open. Sullivan, Eamonn // PC Week;09/01/97, Vol. 14 Issue 37, p32 

    Reports that the Secure Multipurpose Internet Mail Extension (S/MIME) protocol was rejected by the Internet Engineering Task Force as a standard for E-mail encryption. Why S/MIME was rejected; How the rejection impacts the Open Pretty Good Privacy (PGP) protocol; Where Open PGP is used; Why...

  • Safe from Prying Eyes. Stijns, William; Gunton, Mark // World Trade;Sep2000, Vol. 13 Issue 9, p64 

    Deals with the adoption of public/private key infrastructure (PKI), a secure electronic mail service using data encryption technology express companies. Security process involved in the PKI technology; Benefits of a secure electronic document delivery; Forecast on the market growth for secure...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics