SlideShare a Scribd company logo
2
Most read
4
Most read
S A L M A N M E M O N
2 K 1 2 / I T / 1 0 9
U N I V E R S I T Y O F S I N D H J A M S H O R O
EMAIL SECURITY
WHAT IS EMAIL?
• E-Mail  Electronic mail
• A method of exchanging messages in digital form.
• E-mail systems are based on a store-and-forward method in which e-mail server accept, forwards,
delivers and stores messages on behalf of users.
• Users only need to connect to the internet through a computer for the duration of message submission
or retrieval
DID YOU KNOW ?
• The first e-mail message was sent in 1971 by an engineer named Ray
Tomlinson.
EMAIL SECURITY
• Email security refers to the collective measures which used to secure the
access and content of an email account or service. It allows an individual or
organization to protect the overall access to one or more
email addresses/accounts.
EMAIL SECURITY MEASURES INCLUDE
• Avoid using only one Email
• Using multiple Emails simultaneously will distract other people because they do not know
what our real Email are. we can use these Emails to register for login accounts on
Websites, social networks, etc.
• On the current market, 3 Email providers which have the best security are Gmail, MS
Outlook and Yahoo! Mail.
USE A STRONG PASSWORD
• Must use strong password to register all accounts .
• 8 characters
• Uppercase
• Lowercase
• Special characters
• Numbers
PAY ATTENTION TO PHISHING WEBSITES
• Phishing is not a strange term for those who surf the Web regularly.
Professional Hackers often use this method to steal personal information like
password, online transaction accounts, etc.
• If you receive an Email which requires you to enter your account information,
you should ignore these Emails. Do not enter your personal information into
these Emails.
RESTRICT CLICKING ON LINKS ATTACHED IN
EMAILS
• Dangerous Emails often come from unidentified addresses or are junk mails.
These Emails often contain advertising contents and attach Links you must
click to sign in. Do not click on Links in these Emails because these links may
lead you to Websites containing malicious codes, Virus, malware, etc. It is
exceptional if they are Emails from banks or services you are using.
DO NOT OPEN ATTACHMENTS IF THE SENDER IS
UNIDENTIFIED
• If users receive an Email with attached files from an unidentified sender,
surely curious people will download these files, then malicious codes will
spread to their computer instantly. These files will be downloaded
automatically right when you click on them or some EXE files are saved in
popular image formats like JPG, GIF, etc.
SCAN VIRUS ON COMPUTER FREQUENTLY
• You should install an antivirus program on your computer. Then, if you click
on a link in a Phishing Email, this software will automatically alert you when it
detects any Virus or malicious codes so that you can prevent their spread
timely.
SECURITY SERVICES FOR E-MAIL
• Authentication
• Integrity
• Privacy
• Non-repudiation
OPERATION OF EMAIL SECURITY
• (PGP) Pretty Good Privacy
• S/MIME (Secure/Multipurpose Internet Mail Extension
Email security  netwroking

More Related Content

PPT
Email Security and Awareness
PPTX
Email security
PPTX
Email security - Netwroking
PPT
Cyber security and emails presentation
PPTX
Email Security: The Threat Landscape
PPTX
Email threats
PDF
Electrnic mail
PPTX
Welcome to email
Email Security and Awareness
Email security
Email security - Netwroking
Cyber security and emails presentation
Email Security: The Threat Landscape
Email threats
Electrnic mail
Welcome to email

What's hot (18)

PPT
Cel1
PDF
Email security
PPT
PPSX
Mofokeng email etiquette
PPT
Email2 Additional Detail
PDF
2016 網絡私隱通識
PDF
2016 網絡私隱通識
PDF
Sip 140208055023-phpapp02
PPT
Internetsafety08
PPTX
Computer security and ethics
PPT
Internet safety at work presentation
PPTX
Identity Theft - by LINKS Technology
PDF
5 examples of how easily data leaks can occur
PPTX
Week 4 grade_4
PPT
Electronic Communication Investigate
PPT
Internet services
PPT
Internet
Cel1
Email security
Mofokeng email etiquette
Email2 Additional Detail
2016 網絡私隱通識
2016 網絡私隱通識
Sip 140208055023-phpapp02
Internetsafety08
Computer security and ethics
Internet safety at work presentation
Identity Theft - by LINKS Technology
5 examples of how easily data leaks can occur
Week 4 grade_4
Electronic Communication Investigate
Internet services
Internet
Ad

Similar to Email security netwroking (20)

PPT
E‑mail
PPT
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
PPTX
7 Email Security Best Practices You Need to Follow in 2023.pptx
PPTX
Email hacking
PPT
Email
PPSX
Mofokeng email etiquette
PPTX
Tech Training - Session 8
PPT
Cyber security and emails presentation refined
PPTX
PPT
l1email.ppt
PPT
l1email.ppt
PPT
the best file here.ppt
PPT
l1email.ppt
PDF
The Significance of Cybersecurity and securing your system
PPTX
Email forensic and social media forienc.pptx
PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
Information Security Awareness Training Open
PPTX
Cyber Security Training Module 2025.pptx
PPTX
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
PPTX
IT PPT class 9.pptx
E‑mail
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
7 Email Security Best Practices You Need to Follow in 2023.pptx
Email hacking
Email
Mofokeng email etiquette
Tech Training - Session 8
Cyber security and emails presentation refined
l1email.ppt
l1email.ppt
the best file here.ppt
l1email.ppt
The Significance of Cybersecurity and securing your system
Email forensic and social media forienc.pptx
TheCyberThreatAndYou2_deck.pptx
Information Security Awareness Training Open
Cyber Security Training Module 2025.pptx
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
IT PPT class 9.pptx
Ad

More from Salman Memon (20)

PPTX
PHP Array very Easy Demo
PPTX
Complete Lecture on Css presentation
PPTX
How to Use Dreamweaver cs6
PPTX
what is programming and its clear Concepts to the point
PPTX
Working with variables in PHP
PPT
Web forms and html (lect 5)
PPT
Web forms and html (lect 4)
PPT
Web forms and html (lect 3)
PPT
Web forms and html (lect 2)
PPT
Web forms and html (lect 1)
PPT
Managing in the Future Enterprise
PPT
Overview of Technology Management
PPT
Align Information Technology and Business Strategy
PPTX
WHITE BOX & BLACK BOX TESTING IN DATABASE
PPTX
Query decomposition in data base
PPTX
Time Management
PPTX
Multimedea device and routes
PPTX
Hash function
PPTX
Data clustring
PPT
Controlling User Access -Data base
PHP Array very Easy Demo
Complete Lecture on Css presentation
How to Use Dreamweaver cs6
what is programming and its clear Concepts to the point
Working with variables in PHP
Web forms and html (lect 5)
Web forms and html (lect 4)
Web forms and html (lect 3)
Web forms and html (lect 2)
Web forms and html (lect 1)
Managing in the Future Enterprise
Overview of Technology Management
Align Information Technology and Business Strategy
WHITE BOX & BLACK BOX TESTING IN DATABASE
Query decomposition in data base
Time Management
Multimedea device and routes
Hash function
Data clustring
Controlling User Access -Data base

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Electronic commerce courselecture one. Pdf

Email security netwroking

  • 1. S A L M A N M E M O N 2 K 1 2 / I T / 1 0 9 U N I V E R S I T Y O F S I N D H J A M S H O R O EMAIL SECURITY
  • 2. WHAT IS EMAIL? • E-Mail  Electronic mail • A method of exchanging messages in digital form. • E-mail systems are based on a store-and-forward method in which e-mail server accept, forwards, delivers and stores messages on behalf of users. • Users only need to connect to the internet through a computer for the duration of message submission or retrieval
  • 3. DID YOU KNOW ? • The first e-mail message was sent in 1971 by an engineer named Ray Tomlinson.
  • 4. EMAIL SECURITY • Email security refers to the collective measures which used to secure the access and content of an email account or service. It allows an individual or organization to protect the overall access to one or more email addresses/accounts.
  • 5. EMAIL SECURITY MEASURES INCLUDE • Avoid using only one Email • Using multiple Emails simultaneously will distract other people because they do not know what our real Email are. we can use these Emails to register for login accounts on Websites, social networks, etc. • On the current market, 3 Email providers which have the best security are Gmail, MS Outlook and Yahoo! Mail.
  • 6. USE A STRONG PASSWORD • Must use strong password to register all accounts . • 8 characters • Uppercase • Lowercase • Special characters • Numbers
  • 7. PAY ATTENTION TO PHISHING WEBSITES • Phishing is not a strange term for those who surf the Web regularly. Professional Hackers often use this method to steal personal information like password, online transaction accounts, etc. • If you receive an Email which requires you to enter your account information, you should ignore these Emails. Do not enter your personal information into these Emails.
  • 8. RESTRICT CLICKING ON LINKS ATTACHED IN EMAILS • Dangerous Emails often come from unidentified addresses or are junk mails. These Emails often contain advertising contents and attach Links you must click to sign in. Do not click on Links in these Emails because these links may lead you to Websites containing malicious codes, Virus, malware, etc. It is exceptional if they are Emails from banks or services you are using.
  • 9. DO NOT OPEN ATTACHMENTS IF THE SENDER IS UNIDENTIFIED • If users receive an Email with attached files from an unidentified sender, surely curious people will download these files, then malicious codes will spread to their computer instantly. These files will be downloaded automatically right when you click on them or some EXE files are saved in popular image formats like JPG, GIF, etc.
  • 10. SCAN VIRUS ON COMPUTER FREQUENTLY • You should install an antivirus program on your computer. Then, if you click on a link in a Phishing Email, this software will automatically alert you when it detects any Virus or malicious codes so that you can prevent their spread timely.
  • 11. SECURITY SERVICES FOR E-MAIL • Authentication • Integrity • Privacy • Non-repudiation
  • 12. OPERATION OF EMAIL SECURITY • (PGP) Pretty Good Privacy • S/MIME (Secure/Multipurpose Internet Mail Extension