Ch5 NIS
Ch5 NIS
Ch5 NIS
Working of SMTP
1) Composition of Mail: A user sends an e-mail by composing an electronic mail
message using a Mail User Agent (MUA). Mail User Agent is a program which is
used to send and receive mail. The message contains two parts: body and header.
2) Submission of Mail: After composing an email, the mail client then submits the
completed e-mail to the SMTP server by using SMTP on TCP port 25.
3) Delivery of Mail: E-mail addresses contain two parts: username of the recipient
and domain name. For example, vivek@gmail.com, where "vivek" is the username of
the recipient and "gmail.com" is the domain name.
4) Receipt and Processing of Mail: Once the incoming message is received, the
exchange server delivers it to the incoming server (Mail Delivery Agent) which stores
the e-mail where it waits for the user to retrieve it.
5) Access and Retrieval of Mail: The stored email in MDA can be retrieved by using
MUA (Mail User Agent). MUA can be accessed by using login and password.
DEPARTMENT OF COMPUTER ENGINEERING
2) Privacy Enhanced Mail (PEM)
• The privacy Enhanced Mail (EPM) is an email security
standard adopted by the Internet Architecture Board (IAB) to
provide secures electronic mail communication over the
internet.
• PEM is described in four specification documents, which are
RFC number 1421 to 1424.
• PEM support the three main cryptographic functions of
encryption, non-repudiation and message integrity.
•
Cryptographic functions of PEM
PEM allows for three security options when sending an e-mail message. These
options are:
Signature only (step 1 and 2)
Signature and Base-64 encoding (step 1,2 and 4)
Signature, Encryption and Base-64 encoding (step 1 to 4)
1. TUNNEL
MODE
2.
TRANSPORT
MODE
DEPARTMENT OF COMPUTER ENGINEERIN
G
IPSEC TUNNEL MODE
IPSec tunnel mode is the default mode. With tunnel
mode, the entire original IP packet is protected by IPSec.
This means IPSec wraps the original packet, encrypts it, adds
a new IP header and sends it to the other side of the VPN
tunnel (IPSec peer).
Tunnel mode is most commonly used between
gateways (Cisco routers or ASA firewalls), or at an end-
station to a gateway, the gateway acting as a proxy for the
hosts behind it.
Tunnel mode is used to encrypt traffic between secure
IPSec Gateways, for example two Cisco routers connected
over the Internet via IPSec VPN
IPSec Tunnel
mode with AH
header:
IPSec Transport
mode with AH header:
Who is a Hacker?
A Hacker is a person who finds and exploits the weakness in
computer systems and/or networks to gain access.
Hackers are usually skilled computer programmers with
knowledge of computer security.
Hackers are classified according to the intent of their actions
Ethical Hacker (White hat): A hacker who gains access to systems with
a view to fix the identified weaknesses. They may also perform
penetration Testing and vulnerability assessments.
Grey hat: A hacker who is in between ethical and black hat hackers.
He/she breaks into computer systems without authority with a view to
identify weaknesses and reveal them to the system owner.
4. To provide facility to any company that they can store their data in electronic
storage.
5. To provide legal recognition for bankers and other companies to keep accounts in
electronic form.
DEPARTMENT OF COMPUTER ENGINEERIN
G
2) IT act 2008:
• It is the Information Technology Amendment Act,2008.the act was
developed for IT industries, control e-commerce, to provide e-
governance facility and to stop cybercrime attacks. Following are the
characteristics of IT ACT 2008:
• a) This act provide legal recognition for the transaction i.e. Electronic
Data Interchange(EDI) and other electronic communications.
COBIT 5 principles
Principle 1: Meeting stakeholder needs.
Principle 2: Covering the enterprise end to end.
Principle 3: Applying a single integrated framework.
Principle 4: Enabling a holistic approach.
Principle 5: Separating governance from management.
https://
www.isaca.org/resources/news-and-trends/industr
y-news/2014/information-security-management-at
-hdfc-bank