.

Sunday, June 16, 2019

Vulnerabilities Research Paper Example | Topics and Well Written Essays - 500 words

Vulnerabilities - Research Paper ExampleCertificate Authority (CA) and is considered to be the most efficient control in terms of e-mail security (Ellison & Schneier, 2000).In case of secure email, one has to make sure about the sender possessing the key is the one who is the authentic sender. Likewise, when signed email is verified, one of the checks includes the source of the email i.e. the sender. However, if encryption is applied to the public key infrastructure, there is a requirement of identifying people possessing the relevant key to decrypt the message (Ellison & Schneier, 2000). This is the point where email certificates starts to operate, as the certificate ID is a digit all(prenominal)y signed message from the CA that is transmitted to the user linked with the public key. However, the (PKI) possess many risks that may lead to vulnerabilities and in the end threats. One of the risks incorporates a breach of keys associated with the signer via unauthorized access or by any other means (Ellison & Schneier, 2000). However, efficient Certificate governing can mitigate risks by en effective physical security, personnel security and secure network. Pretty Good Privacy PGP counters these issues as well by incorporating Web of Trust including self-governing signatures linked with the single certificate (Ellison & Schneier, 2000). Moreover, for addressing internal security, monitoring of employee emails is a regulatory requirement. However, there are many procedures, tasks and functions associated with it. The requirements can be met by utilizing tools from outlook express that are capable of retrieving certain keywords used in the email. For example, the keyword account can retrieve all emails including this specific word. (Bhatnagar, 2012). However, these outlook tools yet work individually on each workstation and can be solved by incorporating Microsoft Exchange server. As the server will retrieve all emails of all employees containing the specific

No comments:

Post a Comment