Lecture 8 - 10 Technologies in Securing Mobile Devices, Email Comm & The Cloud
Lecture 8 - 10 Technologies in Securing Mobile Devices, Email Comm & The Cloud
Lecture
Technologies in Securing email
Communications
Securing Email communications.
2
Expected Learning Objectives:
Email concept.
Email clients & service providers.
Importance of email security.
Threats associated to emails.
Email security procedure.
Consideration when choosing email client.
3
An email client is a program that allows you send or receive email
communications.
1) Security – Encryption, spam filters & regular updates from threats.
2) Privacy – share privacy policies to users.
3) Visual Appeal – Easy to use controls, Not clustered Content on page.
4) Functionality – i.e display contents before downloading, support multiple
languages
5) Reliability – consistency in performance & backup options.
6) Availability – accessible in multi-platforms.
7) Ease of Use - HCI Options i.e storing & retrievals of mails
Email Security Threats:
4
1) Malicious email attachments.
2) Malicious user redirection – Links within mails directing
users to malware sites.
3) Phishing – User personal/financial info is requested for
malicious gain.
4) Hoax Mails – Attackers sends email to potential victim
scaring them to install certain malwares or reveal certain
info.
5) Spamming. – leads to pollution of internet experience &
company reputation,,(Install spam fighters).
(Expounded Details in notes)
Phishing & Hoax Mails Security Threats Examples:
5
Email Security Procedures:
6
1) Create & Use strong Passwords – Use 2step verifications.
2) Disable keep me signed in/ stay signed in functions.
3) Provide recovery email address for mail recovery.
4) Use HTTPS enabled email service providers.
5) Turn off the preview Feature.
6) Scan email attachments for malwares.
7) Digitally sign your emails.
8) Encryption – Use of Asymmetric, Symetric,Hash functions
Objectives:
Understand Types of clouds & Services they offer.
Cloud Advantages.
Threats to clouds & countermeasures.
Cloud Privacy Issues and how to address them.
Choosing the cloud correctly
Securing The Cloud.
Types of Cloud Architecture. 21