Pgp Appliance In Email Essay

3766 words - 16 pages

CHAPTER 1
INTRODUCTION

The growth of the Internet is unbelievably rapid, more new devices and services coming out generation by generation. Billions and billions of people are using the Internet and thus internet is becoming one of the most essentialities for nowadays people in the whole world. Of the internet services, electronic mail is the most basic and widely-used services. All email users from any location are communicating each other by sending and receiving email messages over the internet for different purposes. However, email is not a secure method of communication.
As email packets have to be routed through many networks over the internet, there grows a large ...view middle of the document...

Applying the PGP program which will give confidentiality and authentication features will improve the security of electronic mailing system.

1.3 PGP Security Features
PGP provides a variety of security features for electronic mail:
• Confidentiality
• Authentication
• Message Integrity
• Non-repudiation of origin
Confidentiality protects the contents of the email message by encrypting against the unauthorized disclosure. No one other than the authorized recipient can read the message.
Data origin authentication permits the authorized receiver of the message to reliably determine the identity of the sender. Only an authorized receiver can authenticate it.
Message integrity provides the authorized recipient of the message assurance that the message has not been altered in transit. The message received that needs to be identical to the message being sent can be verified by using the PGP program.
Non-repudiation of the original sender is the feature that allows one person to forward the message to another email user, who can validate the identity of the original sender.

1.4 Benefits of the Proposed System

• As all the algorithms used for message encryption, session-key encryption, hash code generation and hash code encryption are integrated together in the proposed PGP encryption scheme, it eliminates the need for operating multiple, disparate management systems for deploying, managing, and supporting one or more encryption applications.
• Hybrid encryption system is used in the proposed system that the biggest challenge of key exchange between the users can be covered [12].

1.5 Organization of the Thesis
The basic concepts of the Pretty Good Privacy protocol and its security features are introduced in Chapter 1. The remaining parts of this book are background theory, proposed system operations, implementation of the program for proposed PGP protocol, and finally the conclusion of the system.
Chapter 2 discusses the basic theory of cryptography and PGP protocol. Chapter 3 analyzes the operations and procedures of the PGP program suites and the implementation of the whole system for this thesis is explained in Chapter 4. Conclusion, advantages, limitations and further extensions of the system are expressed in Chapter 5.

CHAPTER 2
BACKGROUND THEORY

2.1 Security Trends
In 1994, The Internet Architecture Board (IAB) issued a report entitled “Security in the Internet Architecture”. The report stated the general consensus that the Internet needs more and better security, and it identified key areas for security mechanisms. Among these were (1) the need to secure the network infrastructure from unauthorized monitoring and control of network traffic, and (2) the need to secure end-user-to-end-user traffic using authentication and encryption mechanisms.
These concerns are fully justified. As confirmation, consider the trends...

Other assignments on Pgp Appliance In Email

Business Plan Capstone Essay

6212 words - 25 pages they are will build our clientele. Having big bold signage so our customers know what we are offering will be bright and legible that can be seen thru-out the events the cart is parked. Social media will play a big role in allowing us to update our locations as soon as we enter any event. We will provide a signup sheet for email addresses, facebook pages, and twitter handles so we can provide updated information. B. Company Summary B1. Industry

Joining Essay

8096 words - 33 pages containers produced at the plant in Albany, Georgia, custom plastic parts produced at the plant in Pontiac, Michigan, and plastic fan parts produced at our new facilities in Hangzhou, China. Our company's research and development is done at the corporate headquarters in San Jose. Riordan's major customers are automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers and appliance manufacturers

Mgt216

714 words - 3 pages The first ethical issue presented in the ethics game simulation was whether to warn consumers about the contaminated product and what information to provide consumers about the contaminant. The second ethical issue was whether to sell a product that does not meet U.S. safety requirements in a foreign market that has lower safety restrictions. G-BioSport was not required to meet prior approval from the Federal Drug Administration before they

Economy Effect Of Marijuana

277 words - 2 pages Modern American History by Alan Renga 2nd Mid Term! You will be given 3 Short Essay questions and 20 Multiple Choice questions deriving from this list! 80 points total! The 1920s Warren Harding then Calvin Coolidge Tea Pot Dome 1st Red Scare Immigration Restriction, Sacco and Vanzetti Langston Hughes, Marcus Garvey, KKK Prosperity, advertising Prohibition, Al Capone Flappers, Clara Bow, Rudolph Valentino Babe Ruth, Jack Dempsey

The Vc Shakeout

2033 words - 9 pages ECONOMY 26 Luring a big firm to town is not the secret to job growth DEFEND YOUR RESEARCH 30 Are morning people wired for success? VISION STATEMENT 32 The social web’s east-west divide COLUMN 38 Warren Bennis looks back on his surprising path to fame New Thinking, Research in Progress hbr.org New Thinking, Research in Progress hbr.org FIRST The VC Shakeout Venture capital hasn’t worked for a decade and must be radically

Hospitals Paper

6014 words - 25 pages I hope to provide in this paper a comprehensive understanding for what the term “hospital” has become. Hospitals are an extremely complex system that man has created and shaped and reshaped throughout history. My goal in writing and researching this paper will be to provide those who read it a clear understanding on how the hospital system got to where it is today, and to shed some light on the many organizations that affiliate with and

Course Syllabus

2610 words - 11 pages Accept.” If you have previously taken a course using MyMathLab or CourseCompass, click Yes, Look Me Up and enter your username and password. Otherwise, select No, I am a New User. Enter your Access Code in the fields provided (type one “word” per box). Enter your School Zip Code, select your Country, and click Next. Enter your Course ID and click Next. Enter your Name and Email and select Your School. Create your Login Name and

Management

1477 words - 6 pages . Planning allows organizations to develop how the customers’ needs can be met, what is expected out of the company, and the environment. The structure of management helps accommodate the need for experience and expertise on important factors. Some of these factors are legal issues, ethics, and corporate social responsibility instead of just focusing on the profits. The Planning Function of Management Boeing was started in 1916 by William Edward

Assisted Suicide

1015 words - 5 pages Should physician-assisted suicide be legal? While I believe if one chooses to end his or own life through physician assistance for reasons that they chose, the choice should be up to the individual. Physician-assisted suicide should be at one's discretion. “Assisted Suicide, also called Voluntary Euthanasia, is currently a contentious issue in many countries. Because Euthanasia is legal in a few modern democracies: the Netherlands, Belgium

Tanglewood Case 1

797 words - 4 pages Tanglewood’s staffing strategy requires the organization to make key decisions about the acquisition, deployment, and retention of the organization’s workforce. In order to accomplish this, Tanglewood’s must make thirteen decisions regarding its staffing levels and its staffing quality. One of the first decisions that Tanglewood needs to choose is to acquire or develop talent. Tanglewood should try to develop their current talent because one

Nnnnn

1391 words - 6 pages Есе по въпроса: Кои от всички „действащи” лица могат да се разглеждат като морално отговорни и в какво именно? по казуса Форд „Пинто” Корпоративните злодеяния са нанесли повече вреди на обществото от всички улични престъпления взети заедно. Според данни на ФБР сумата от уличните престъпления възлиза на $3.8 млрд. годишно, а загубите от корпоративните измами между $100 млрд. и $400 млрд. годишно

Similar Documents

Multi Layers Security Essay

1139 words - 5 pages . Mail servers should also be equipped with security. These systems receive, send, and store email, and an email security solution should work together with the email program to provide a greater degree of protection against malicious code. One of the most convenient and hassle-free ways to protect servers and gateways is to use a security appliance. These preconfigured and tuned, self-contained units are easy to integrate into an existing

Information Systems Security Essay

3283 words - 14 pages security appliance used to filter inbound IP packets based on various ACL definitions configured for IP, TCP, and UDP packet headers. It can examine IP, TCP, or UDP packet headers for filtering. Speaking of filtering, we will institute a web content filter and an email content filter. These security appliances can prevent content from our infrastructure by filtering out certain domain names or keywords within domain names and by blocking content

Customer Support Megatrends And Next Practices

5356 words - 22 pages unwarranted field service truck rolls: A big source of customer service cost and carbon emissions is unwarranted field service trips. In the case of big-ticket items like household appliances, manufacturers can preempt unnecessary field service “truck rolls” and associated carbon emissions through effective problem resolution by contact center agents and web self-service. A premier home appliance manufacturer, a household name in the US, preempts field

Wgu Capstone Essay

8774 words - 36 pages Dynamic Local User must have a password that is unique from all other accounts held by that user. Passwords must not be inserted into email messages or other forms of electronic communication. Where the Simple Network Management Protocol (SNMP) is used to access systems, the community strings must be defined as something other than the standard defaults of ‘public’, ‘private’ and ‘system’ and must be different from the passwords used to log in