Hacker Highschool_ Lesson 9 Email Security.pdf

(535 KB) Pobierz
LESSON 9
E-MAIL SECURITY
LESSON 9 – E-MAIL SECURITY
“License for Use” Information
The following lessons and workbooks are open and publicly available under the following
terms and conditions of ISECOM:
All works in the Hacker Highschool project are provided for non-commercial use with
elementary school students, junior high school students, and high school students whether in a
public institution, private institution, or a part of home-schooling. These materials may not be
reproduced for sale in any form. The provision of any class, course, training, or camp with
these materials for which a fee is charged is expressly forbidden without a license including
college classes, university classes, trade-school classes, summer or computer camps, and
similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at
www.hackerhighschool.org/license.
The HHS Project is a learning tool and as with any learning tool, the instruction is the influence
of the instructor and not the tool. ISECOM cannot accept responsibility for how any
information herein is applied or abused.
The HHS Project is an open community effort and if you find value in this project, we do ask
you support us through the purchase of a license, a donation, or sponsorship.
All works copyright ISECOM, 2004.
2
LESSON 9 – E-MAIL SECURITY
Table of Contents
“License for Use” Information............................................................................................................... 2
Contributors..............................................................................................................................................4
9.0 Introduction........................................................................................................................................5
9.1 How E-mail Works.............................................................................................................................. 6
9.1.1 E-mail Accounts......................................................................................................................... 6
9.1.2 POP and SMTP............................................................................................................................6
9.1.3 Web Mail.....................................................................................................................................7
9.2 Safe E-mail Usage Part 1: Receiving............................................................................................... 9
9.2.1 Spam, Phishing and Fraud........................................................................................................9
9.2.2 HTML E-Mail ................................................................................................................................9
9.2.3 Attachment Security..................................................................................................................9
9.2.4 Forged headers........................................................................................................................10
9.3 Safe E-mail Usage Part 2: Sending................................................................................................ 12
9.3.1 Digital Certificates................................................................................................................... 12
9.3.2 Digital Signatures......................................................................................................................13
9.3.3 Getting a certificate................................................................................................................14
9.3.4 Encryption.................................................................................................................................14
9.3.5 How does it work?....................................................................................................................14
9.3.6 Decryption................................................................................................................................15
9.3.7 Is Encryption Unbreakable?....................................................................................................15
9.4 Connection Security.......................................................................................................................16
3
LESSON 9 – E-MAIL SECURITY
Contributors
Stephen F. Smith, Lockdown Networks
Chuck Truett, ISECOM
Marta Barceló, ISECOM
Kim Truett, ISECOM
4
LESSON 9 – E-MAIL SECURITY
9.0 Introduction
Everyone uses e-mail. It is the second most used application on the internet next to your web
browser. But what you might not realize is that a significant portion of network attacks and
compromises originate through e-mail. And with respect to your privacy, misuse of e-mail has
the potential to disclose either the contents of your message, or give a spammer information
about you. The purpose of this module is to give you information on how e-mail works, safe e-
mail usage, e-mail based attacks, and security strategies for e-mail.
5
Zgłoś jeśli naruszono regulamin