SlideShare a Scribd company logo
Encrypting E-mail Messages
Introduction
According to case study 2 , All net solutions has a
different offices in several parts of new Zealand ,
they asked for help to create a different types of
email cryptography security options that can be
implemented , what problems this security facing
and best solutions for that and ease of use ,
including packages work with lotus notes ,Pegasus,
Microsoft outlook and Novell GroupWise, rank the
packages according to the criteria :are the easiest to
use and have the most features.
What is Encryption of Email Messages
Sometimes we want additional protection for our
e-mail communication to keep it from unwanted
eyes.
It is the process that protect the privacy of message
by converting it from plaintext(readable) into cipher
text (scrambled).
Only the recipient who has the private key that
matches the public key used to encrypt the
message can decipher the message for reading .
Any recipient without the corresponding private
key would see only garbled (change or alter) text.
Encrypting E-mail Messages
Cryptography system used two keys
Public key: known to everyone
Private key :it is the secret key known only to the recipient
of the message.
Example sender wants to send secure message to recipient
,sender use the recipient’s public key to encrypt the message
, then recipient use the private key to decrypt it.
Other high-end encrypted email methods such as:
PGP
S/MIME
PGP
Pretty Good Privacy (PGP) is a data encryption and
decryption computer program that
provides cryptographic privacy and authentication for data
communication.
PGP is often used for signing, encrypting,
and decrypting texts, e-mails, files, directories, and whole
disk partitions and to increase the security of e-mail
communications.
Encrypting E-mail Messages
S/MIME
S/MIME (Secure/Multipurpose Internet Mail Extensions) is
a widely accepted method, or more precisely a protocol, for
sending digitally signed and encrypted messages.
S/MIME allows you to encrypt emails and digitally sign
them.
When you use S/MIME with an email message, it helps the
people who receive that message to be certain that what
they see in their inbox is the exact message that started with
the sender.
Encrypting E-mail Messages
Encryption email messages facing some challenging or
disadvantages:
Encryption Keys: Without a doubt, data encryption is a monumental
task for an IT specialist. The more data encryption keys there are the
more difficult IT administrative tasks for maintaining all of the keys can
be. If you lose the key to the encryption, you have lost the data
associated with it.
Expense: Data encryption can prove to be quite costly because the
systems that maintain data encryption must have capacity and
upgrades to perform such tasks. Without capable systems, the
reduction of systems operations can be significantly compromised.
 Unrealistic Requirements: If an organization does not understand
some of the restraints imposed by data encryption technology, it is
easy to set unrealistic standards and requirement which could
jeopardize data encryption security.
 Compatibility: Data encryption technology can be tricky when you
are layering it with existing programs and applications. This can
negatively impact routine operations within the system.
Advantages of encryption email messages
 Separation: Data encryption allows the data to remain
separate from the device security where it is stored.
Security is included with the encryption which permits
administrators to store and transmit data via unsecured
means.
 No Data Breaches: Data encryption circumvents the
potential complications that accompany data breaches
which provide ensured protection of intellectual property
and other similar types of data.
 Encryption Is On The Data: Because the encryption is on
the data itself, the data is secure regardless of how it is
transmitted. An exception to the rule can be transmission
tools such as email because sometimes a typical email
account does not provide the necessary security.
 Encryption Equals Confidentiality: A lot of organizations
are required to meet specific confidentiality
requirements and other associated regulations.
Encrypting data means that it can only be read by the
recipient who has the key to opening the data.
Email encryption messages that work with
Lotus notes
Pegasus
Microsoft outlook
Novell Groupwise
Lotus Notes
Security features
Public key infrastructure
 attenuation
 Encryption
Access control levels
Server , database
Document field
Strong reputation
Extremely few vulnerabilities.
Pegasus:
a powerful filtering system, so much so that it is possible to
run a fully automated client-based electronic mailing
list (including processing subscriptions, unsubscriptions
and forwards to moderation) using solely Pegasus Mail;
the ability to automatically select which email address to
send a reply from, based on the mail folder containing the
original received message;
the ability to include custom e-mail header lines (useful for
tracking emails, for example);
the ability to delete attachments without deleting the
message's text body, or to delete the HTML version of a
message while keeping the plain-text version, or vice versa,
saving disk space;
easy access to a message, including all headers, in raw form,
which is difficult or impossible in some other clients;
a "tree view" of the structure of a multipart message with all
its sections and attachments, giving access to view or save any
of the parts separately
support for downloading headers only, then deciding for each
message whether to download, delete, or leave for later
("Selective mail download"). It is possible to download a
message in full without deleting it from the server.
Microsoft outlook:
Outlook includes security features that allow you to send and
receive secure messages over the Internet. To accomplish this,
Outlook incorporates support for the Secure Multi-Purpose
Internet Messaging Extensions (S/MIME) protocol. Using this
standard enables you to send and receive signed or sealed
(encrypted) Internet e-mail.
This article describes how the following information:
 How to get a digital ID for sending secure messages.
 How to back up or copy a digital ID.
 How to move a digital ID to another computer.
 How to send a signed message.
 How to add a digital ID to your Contacts list.
 How to send an encrypted (sealed) message.
 How to sign or encrypt all messages that you send.
Novell GroupWise:
GroupWise is a messaging and collaboration platform
from Novell that supports email, calendaring, personal
information management, instant messaging, and
document management. The GroupWise platform
consists of desktop client software, which is available
for Windows, Mac OS X, and Linux, and the server
software, which is supported on Windows Server and
Linux.
The best email encryption software 2016 top
ten review
As a security level
HP Secure Mail
Pros
:
HP Secure Mail provides compliant email
communications, a wide range of hardware
compatibility and integration with most business
applications. It supports one-click and policy-based
email encryption and includes numerous reporting
options.
Cons
:
If you use Lotus Notes, you have to send inter-office
emails using the Lotus security option. HP Secure Mail
is not compatible with Android Honeycomb.
 Since there are many points both positive and negative to
consider, strategic planning for data encryption within an
organization is the key. Without detailed planning, data
encryption can easily become complex for the IT
administrator to manage and complicated for the end
users.
 organizations should hire professional secure email service
that easily overcomes the challenges of simplicity and
compatibility, offering the best value for your money.

 https://support.office.com/.../Encrypt-e-mail-messa
 searchsecurity.techtarget.com/definition/Pretty-Good-
Privacy
 https://en.wikipedia.org/wiki/S/MIME
 email-encryption-software-review.toptenreviews.com/
Encrypting E-mail Messages

More Related Content

PPT
Basics of E-Mail
PDF
Spam Email identification
PDF
Client Server Network Security
PPTX
Electronic mail
PPTX
Internet security
PDF
Html tables examples
PPT
E Mail
PPTX
Email: Introduction
Basics of E-Mail
Spam Email identification
Client Server Network Security
Electronic mail
Internet security
Html tables examples
E Mail
Email: Introduction

What's hot (20)

PPT
Introduction to Gmail
PPT
Web Tech
PDF
Cyber Law & Forensics
PDF
1. web technology basics
PPTX
Email server system1.ppt
PPTX
Intranet & Extranet
PPTX
Internet connection
PPT
hosting.ppt
PPT
Hacking And Its Prevention
PPTX
DOCX
Online Shopping project report
PPTX
Internet
DOCX
Online Shop Project Report
PPTX
Internet terminologies
PPT
E-commerce for retailers
PPT
MySQL ppt
PPSX
I way - Network Infrastructure for e-Commerce
PPTX
Cyberspace
PPTX
ATM project presentation
Introduction to Gmail
Web Tech
Cyber Law & Forensics
1. web technology basics
Email server system1.ppt
Intranet & Extranet
Internet connection
hosting.ppt
Hacking And Its Prevention
Online Shopping project report
Internet
Online Shop Project Report
Internet terminologies
E-commerce for retailers
MySQL ppt
I way - Network Infrastructure for e-Commerce
Cyberspace
ATM project presentation
Ad

Similar to Encrypting E-mail Messages (20)

PPT
apsec SEPPmail Email Security Gateway
PPT
Outlook and thunderbird ii
PPTX
Chapter 2 System Security.pptx
DOC
PPTX
Email security
PPTX
S/MIME & E-mail Security (Network Security)
DOCX
Microsoft Forefront - Exchange Hosted Services Whitepaper
PDF
Network Security CS2
DOCX
APPLICATION LAYER Networking refers to the practice of connecting computers, ...
PDF
Balancing Cloud-Based Email Benefits With Security
PDF
Top 10 Secure Email Providers to Consider in 2022
PPTX
cryptography for home users
PDF
How to Secure Communication Channels.pdf
PDF
Analysis of Cryptographic Algorithms for Network Security
PDF
Nt1330 Unit 7
DOCX
UNIT-3.docx
PDF
Trend Micro - Hosted eMail Security
PDF
IRJET- A Work Paper on Email Server using 3DES
apsec SEPPmail Email Security Gateway
Outlook and thunderbird ii
Chapter 2 System Security.pptx
Email security
S/MIME & E-mail Security (Network Security)
Microsoft Forefront - Exchange Hosted Services Whitepaper
Network Security CS2
APPLICATION LAYER Networking refers to the practice of connecting computers, ...
Balancing Cloud-Based Email Benefits With Security
Top 10 Secure Email Providers to Consider in 2022
cryptography for home users
How to Secure Communication Channels.pdf
Analysis of Cryptographic Algorithms for Network Security
Nt1330 Unit 7
UNIT-3.docx
Trend Micro - Hosted eMail Security
IRJET- A Work Paper on Email Server using 3DES
Ad

Recently uploaded (20)

PPTX
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
PPTX
Overview Planner of Soft Skills in a single ppt
PDF
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
PPTX
Principles of Inheritance and variation class 12.pptx
PDF
esg-supply-chain-webinar-nov2018hkhkkh.pdf
PDF
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
PPTX
The Stock at arrangement the stock and product.pptx
PPTX
E-Commerce____Intermediate_Presentation.pptx
PPTX
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
PDF
Prostaglandin E2.pdf orthoodontics op kharbanda
PPTX
Autonomic_Nervous_SystemM_Drugs_PPT.pptx
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
PPTX
OCCULAR MANIFESTATIONS IN LEPROSY.pptx bbb
PPTX
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
PDF
HR Jobs in Jaipur: 2025 Trends, Banking Careers & Smart Hiring Tools
PPTX
CORE 1 HOUSEKEEPING TOURISM SECTOR POWERPOINT
PDF
L-0018048598visual cloud book for PCa-pdf.pdf
PPTX
1-4 Chaptedjkfhkshdkfjhalksjdhfkjshdljkfhrs.pptx
PPTX
Discovering the LMA Course by Tim Han.pptx
PDF
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
Overview Planner of Soft Skills in a single ppt
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
Principles of Inheritance and variation class 12.pptx
esg-supply-chain-webinar-nov2018hkhkkh.pdf
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
The Stock at arrangement the stock and product.pptx
E-Commerce____Intermediate_Presentation.pptx
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
Prostaglandin E2.pdf orthoodontics op kharbanda
Autonomic_Nervous_SystemM_Drugs_PPT.pptx
1751884730-Visual Basic -Unitj CS B.pptx
OCCULAR MANIFESTATIONS IN LEPROSY.pptx bbb
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
HR Jobs in Jaipur: 2025 Trends, Banking Careers & Smart Hiring Tools
CORE 1 HOUSEKEEPING TOURISM SECTOR POWERPOINT
L-0018048598visual cloud book for PCa-pdf.pdf
1-4 Chaptedjkfhkshdkfjhalksjdhfkjshdljkfhrs.pptx
Discovering the LMA Course by Tim Han.pptx
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf

Encrypting E-mail Messages

  • 1. Encrypting E-mail Messages Introduction According to case study 2 , All net solutions has a different offices in several parts of new Zealand , they asked for help to create a different types of email cryptography security options that can be implemented , what problems this security facing and best solutions for that and ease of use , including packages work with lotus notes ,Pegasus, Microsoft outlook and Novell GroupWise, rank the packages according to the criteria :are the easiest to use and have the most features.
  • 2. What is Encryption of Email Messages Sometimes we want additional protection for our e-mail communication to keep it from unwanted eyes. It is the process that protect the privacy of message by converting it from plaintext(readable) into cipher text (scrambled). Only the recipient who has the private key that matches the public key used to encrypt the message can decipher the message for reading . Any recipient without the corresponding private key would see only garbled (change or alter) text.
  • 4. Cryptography system used two keys Public key: known to everyone Private key :it is the secret key known only to the recipient of the message. Example sender wants to send secure message to recipient ,sender use the recipient’s public key to encrypt the message , then recipient use the private key to decrypt it. Other high-end encrypted email methods such as: PGP S/MIME
  • 5. PGP Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.
  • 7. S/MIME S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted method, or more precisely a protocol, for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them. When you use S/MIME with an email message, it helps the people who receive that message to be certain that what they see in their inbox is the exact message that started with the sender.
  • 9. Encryption email messages facing some challenging or disadvantages: Encryption Keys: Without a doubt, data encryption is a monumental task for an IT specialist. The more data encryption keys there are the more difficult IT administrative tasks for maintaining all of the keys can be. If you lose the key to the encryption, you have lost the data associated with it. Expense: Data encryption can prove to be quite costly because the systems that maintain data encryption must have capacity and upgrades to perform such tasks. Without capable systems, the reduction of systems operations can be significantly compromised.
  • 10.  Unrealistic Requirements: If an organization does not understand some of the restraints imposed by data encryption technology, it is easy to set unrealistic standards and requirement which could jeopardize data encryption security.  Compatibility: Data encryption technology can be tricky when you are layering it with existing programs and applications. This can negatively impact routine operations within the system.
  • 11. Advantages of encryption email messages  Separation: Data encryption allows the data to remain separate from the device security where it is stored. Security is included with the encryption which permits administrators to store and transmit data via unsecured means.  No Data Breaches: Data encryption circumvents the potential complications that accompany data breaches which provide ensured protection of intellectual property and other similar types of data.
  • 12.  Encryption Is On The Data: Because the encryption is on the data itself, the data is secure regardless of how it is transmitted. An exception to the rule can be transmission tools such as email because sometimes a typical email account does not provide the necessary security.  Encryption Equals Confidentiality: A lot of organizations are required to meet specific confidentiality requirements and other associated regulations. Encrypting data means that it can only be read by the recipient who has the key to opening the data.
  • 13. Email encryption messages that work with Lotus notes Pegasus Microsoft outlook Novell Groupwise
  • 14. Lotus Notes Security features Public key infrastructure  attenuation  Encryption Access control levels Server , database Document field Strong reputation Extremely few vulnerabilities.
  • 15. Pegasus: a powerful filtering system, so much so that it is possible to run a fully automated client-based electronic mailing list (including processing subscriptions, unsubscriptions and forwards to moderation) using solely Pegasus Mail; the ability to automatically select which email address to send a reply from, based on the mail folder containing the original received message; the ability to include custom e-mail header lines (useful for tracking emails, for example); the ability to delete attachments without deleting the message's text body, or to delete the HTML version of a message while keeping the plain-text version, or vice versa, saving disk space;
  • 16. easy access to a message, including all headers, in raw form, which is difficult or impossible in some other clients; a "tree view" of the structure of a multipart message with all its sections and attachments, giving access to view or save any of the parts separately support for downloading headers only, then deciding for each message whether to download, delete, or leave for later ("Selective mail download"). It is possible to download a message in full without deleting it from the server.
  • 17. Microsoft outlook: Outlook includes security features that allow you to send and receive secure messages over the Internet. To accomplish this, Outlook incorporates support for the Secure Multi-Purpose Internet Messaging Extensions (S/MIME) protocol. Using this standard enables you to send and receive signed or sealed (encrypted) Internet e-mail. This article describes how the following information:  How to get a digital ID for sending secure messages.  How to back up or copy a digital ID.  How to move a digital ID to another computer.  How to send a signed message.  How to add a digital ID to your Contacts list.  How to send an encrypted (sealed) message.  How to sign or encrypt all messages that you send.
  • 18. Novell GroupWise: GroupWise is a messaging and collaboration platform from Novell that supports email, calendaring, personal information management, instant messaging, and document management. The GroupWise platform consists of desktop client software, which is available for Windows, Mac OS X, and Linux, and the server software, which is supported on Windows Server and Linux.
  • 19. The best email encryption software 2016 top ten review
  • 20. As a security level
  • 21. HP Secure Mail Pros : HP Secure Mail provides compliant email communications, a wide range of hardware compatibility and integration with most business applications. It supports one-click and policy-based email encryption and includes numerous reporting options. Cons : If you use Lotus Notes, you have to send inter-office emails using the Lotus security option. HP Secure Mail is not compatible with Android Honeycomb.
  • 22.  Since there are many points both positive and negative to consider, strategic planning for data encryption within an organization is the key. Without detailed planning, data encryption can easily become complex for the IT administrator to manage and complicated for the end users.  organizations should hire professional secure email service that easily overcomes the challenges of simplicity and compatibility, offering the best value for your money. 
  • 23.  https://support.office.com/.../Encrypt-e-mail-messa  searchsecurity.techtarget.com/definition/Pretty-Good- Privacy  https://en.wikipedia.org/wiki/S/MIME  email-encryption-software-review.toptenreviews.com/