Wednesday, May 1, 2019

Protection of data Essay Example | Topics and Well Written Essays - 2500 words

Protection of data - Essay ExampleThere be number of organizers and facilitators in the form of computer software, hardware, mobile phones, smart phones, laptops, tablet-pcs, and other such(prenominal) gadgets that allow the substance abuser to write the contents, record it and then send it to the destined telecommunicate account. This entire route of services plow for to be protected and secured against any threat that could cost the content and pass malafide contents with an intention to damage network of other people (Voltage 2011) The management of telecommunicates and its accounts are done by the electronic mail server which has some(prenominal) components out of which two components that are always required consists of Mail lurch Agent (MTA) and Mail lurch Agent (MDA). Both of these components perform different tasks. Emails are held by Mail Delivery Agent for address to users while netmails are sent and received from other servers on Internet by Mail Transfer Agent (Swanson 2004) The Mail Transfer Agent uses Simple Mail Transfer communications protocol (SMTP) which picks mail from the email clients and sends to its destination server. The Mail Delivery Agent utilize two standard protocols Post Office Protocol (POP) and Internet Mail Access Protocol (IMAP). The main difference between the two protocols are that after(prenominal) downloading the email from POP Server, the mail client removes email messages from the server, living the responsibility for the user to store and defend it on a local machine (Swanson 2004) Whereas messages are stored in mail server and the backup is similarly made by the server. Messages are not deleted after downloading from IMAP server. POP is an older protocol and its use is reduction compared with IMAP protocol. The complexity and confusion comes when these two different types of protocols interact on the internet (Swanson 2004) Another component used commonly for protecting external attacks is the firewall software. Crackers and hackers deceive and bypass firewall by tunneling through the protocols used for email accounts as the contents of email are not checked by any protocol or system (GFI Software 2011) Email systems are classified in six ways as attached below for which they are exploited for the purposes of information theft, attacking networks of other people and harassing target systems (GFI Software 2011) 1. set on by trojans and viruses 2. Leakage of information 3. Malicious or offensive content 4. Varying methods of email attacks 5. Vulnerabilities in different software 6. Insufficient protection by security tools 7. Junk emails or SPAM labour TWO EXAMPLES OF EMAIL EXPLOITS Attacks by trojans and viruses The use of email has become global and wide spread. The hackers use email to tunnel the trojans and viruses as no security or email protocols check its text. In January 2004, it was reported by CNN that email virus MyDoom cost them US$250 million in productivity lost and expenses for technical support. similarly in the studies cited by NetworkWorld (September 2003), U.S. companies alone spent an amount of US$3.5 billion to fight against the email viruses such as Blaster, SoBig.F, Wechia and others(GFI Software 2011) Trojans are sent by email and as soon as the email is opened it installs specific code which gains the control of servers and confidential information. Security experts in the computer technology call such trojans as spy viruses or instructive viruses tools for industrial espionage. In October 2000,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.