EmailSecurity
EmailSecurity
Security
1. Introduction to Email
Email is one of the most widely used methods of digital communication. Understanding how
emails are transmitted and secured is crucial for both users and IT professionals. This
document explores the journey of an email from source to destination, the protocols
involved, email security measures, and how to identify phishing attempts.
1. Composing an Email: A user drafts an email using an email client (e.g., Gmail,
Outlook, Thunderbird).
2. SMTP Communication: When the user hits ‘send,’ the email client connects to the
outgoing mail server using the Simple Mail Transfer Protocol (SMTP).
3. DNS Lookup for Recipient’s Server: The SMTP server queries the Domain Name
System (DNS) to retrieve the recipient’s mail exchange (MX) record.
4. Establishing Connection: The sender's SMTP server establishes a connection with
the recipient’s SMTP server via TCP on port 25, 465, or 587.
5. Email Handoff: The email is transferred from the sender's SMTP server to the
recipient's SMTP server.
6. Recipient’s Server Verification: The recipient’s email server checks SPF, DKIM,
and DMARC records to verify the sender's authenticity.
7. Spam and Malware Scanning: The recipient's server scans the email for spam,
malware, and phishing attempts before accepting it.
8. Email Queuing: If the recipient’s email server is unavailable, the sending server
queues the email for later delivery.
9. Email Storage: Once received, the email is stored in the recipient’s mailbox.
10.Retrieving the Email: The recipient’s email client fetches the email using either:
○ Post Office Protocol (POP3) – downloads and removes emails from the
server.
○ Internet Message Access Protocol (IMAP) – keeps emails on the server and
allows remote access.
11.Displaying the Email: The recipient reads the email using an email client.
3. Email Protocols
Several key protocols enable email communication:
.
● Domain Name System (DNS):
○ DNS translates domain names into IP addresses and helps route emails via
MX records.
○ MX (Mail Exchange) records specify mail servers responsible for receiving
emails for a domain.
● Transport Layer Security (TLS):
○ TLS encrypts email transmissions between email clients and servers,
preventing interception.
○ Many modern email services require TLS for secure communication.
● SPF prevents email spoofing by verifying if an email was sent from an authorized
mail server.
● It uses a TXT record in DNS that lists permitted email-sending IP addresses for a
domain.
● When an email is received, the recipient’s server checks the SPF record to validate
the sender’s identity.
● DMARC builds on SPF and DKIM to protect against phishing and spoofing attacks.
● It allows domain owners to specify how email providers should handle
unauthenticated emails.
● Provides reporting mechanisms to monitor fraudulent email activities.
● End-to-End Encryption (PGP, S/MIME): Protects email content so only the intended
recipient can decrypt it.
● TLS Encryption: Secures email transmission between mail servers and clients.
● Spam Filters: Identify and block unwanted emails based on content analysis and
blacklists.
● Anti-Malware Solutions: Scan attachments and links to prevent malware infections.
● Regular Software Updates: Patch vulnerabilities in email clients and servers.
● Scans incoming and outgoing emails for spam, malware, and phishing attempts.
● Uses machine learning and AI to detect suspicious patterns.
● Filters content based on policies to prevent data leakage.
● Requires users to verify their identity using additional authentication factors such as:
○ One-time passwords (OTP)
○ Biometrics (fingerprint or facial recognition)
○ Security keys (YubiKey, Google Titan, etc.)
● Uses artificial intelligence to analyze user behavior and detect anomalies in email
communications.
● Identifies phishing and impersonation attempts before they reach users.
● Continuously updates threat intelligence based on emerging cyber threats.
Step4:- Now click on analyze headers and we will see detailed information about the email
headers.
Here we can see that SPF DMARC and DKIM have not passed successfully which means
that this email might have been tampered during its journey so it is best to not click on any
link that is present in this email.
After this information we can see that it has analysed the email headers and presented in a
readable format.