TITLE

Whose Email Is It Anyway?

AUTHOR(S)
Zalud, Bill
PUB. DATE
July 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2010, Vol. 47 Issue 7, p52
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses ways on how to protect data coming from electronic mails, faxes, voicemails, electronic documents, and large digital files that are received and sent from enterprises. It stresses the need to authenticate the sender and receiver of the files by internal or external auditors. It also suggests the use of public key infrastructure (PKI) to bind public keys through a certificate authority (CA).
ACCESSION #
53278922

 

Related Articles

  • Are You Practicing Secure Collaboration Or Is It Chaotic ? Faitelson, Yaki // Database & Network Journal;Oct2011, Vol. 41 Issue 5, p19 

    In this article the author discusses the chaos in security practices of organization for digital files collaboration through file shares, email and SharePoint. He states that the growth of the data management components such as folders, groups and lists of access control makes it difficult to...

  • Information Security: Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology: GAO-01-277. McClure, David L. // GAO Reports;2/26/2001, p1 

    The federal government must overcome several major challenges before public key infrastructure (PKI) technology can be widely and effectively used. These challenges include providing interoperability among agency PKIs, ensuring that PKI implementations can support a potential large scale of...

  • Enterprise Delegation for Service Based Systems. Chandersekaran, Coimbatore; Simpson, William R. // International Journal of Network Security & Its Applications;May2011, Vol. 3 Issue 3, p138 

    Sharing information and maintaining privacy and security is a requirement in distributed environments. Mitigating threats in a distributed environment requires constant vigilance and defense-in- depth. Most systems lack a secure model that guarantees an end-to-end security. We devise a model...

  • Sign Here. Goodman, Josh // Governing;Sep2003, Vol. 16 Issue 12, p40 

    Reports on the development of public-key infrastructure by several U.S. states to be used for issuing and verifying digital certificates and thereby enable the use of digital signatures. Comparison of the approaches of Kansas and Illinois to making public-key infrastructure interoperable.

  • Deciphering PKI. Smith, Russell // Windows IT Pro;May2011, Vol. 17 Issue 5, p37 

    The article focuses on how encryption, digital signatures and digital certificates work together to secure and maintain the integrity and confidentiality of sensitive data. These factors are needed prior to implementation of a public key infrastructure (PKI) solution. PKI is the prevailing trend...

  • Fortification of Transport Layer Security Protocol with Hashed Fingerprint Identity Parameter. Kaur, Kuljeet; Geetha, G. // International Journal of Computer Science Issues (IJCSI);Mar2012, Vol. 9 Issue 2, p188 

    Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Public Key Infrastructure is deployed by various organizations. For end to end transport security SSL...

  • Superficial security. Rothke, Ben // eWeek;2/21/2005, Vol. 22 Issue 8, p37 

    The article focuses on issues related to data protection in business enterprises. Too many organizations deploy security technologies because they feel they have to, yet they often leave them so poorly configured that they do more harm than good. Getting out of the mechanics of information...

  • Based on improved CAN PKI trust model. Hong Xiang Gong; Zhu Wen Hui; Liu Hao; Lv Xiang Yang // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 3, p703 

    PKI technology is the key to address some problems on interoperability of different PKI architecture and efficiently build certification paths. By analyzing several existing PKI trust model, this paper proposes a new PKI trust model that based on an improved CAN resource locating model. The new...

  • PKI Development in Estonia: Issues of Concern. Melnikova, Ksenia; Kreslins, Karlis // EBS Review;2001, Issue 13, p72 

    The article explores the challenges and concerns about the Public Key Infrastructure (PKI) mechanism in Estonia. It is stated that PKI is one of the tools for achieving secure authentication of identity, privacy and authorized access to information. The organizations or non-ethical issues...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics