Preview

Secured Email Server and Http Keyserver Protocol (Hkp) in Php

Powerful Essays
Open Document
Open Document
5973 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secured Email Server and Http Keyserver Protocol (Hkp) in Php
CHAPTER I
INTRODUCTION
OVERVIEW
This project entitled Secured Email Server and HTTP Keyserver Protocol (HKP) in PHP which has been specifically created will provide us with in depth input on the security in email communication using the cryptography method. In this project, the term ‘Secured Email Server’ refers to the implementation of cryptography method known as Gnu Privacy Guard (GPG) in the email server. The word ‘HKP’ refers to the key server that is used to centralize the GPG key uploaded by users.

This protocol is executed using Hypertext Preprocessor (PHP) Programming Language that has been installed in the webmail directory residing in the email server. Therefore, this is one other method that should be used in our internal and external network for the securing of email communication through the reduction of network vulnerability amount.

Through research, we have found that to implement this project, we have to maintain the role of computer security that may be related to our project implementation which is:

* Confidentiality: protection against data disclosure * Integrity: protection against data modification * Availability: protection against data disponibility * Identification &
Authentication (I&A): provide a way of identifying entities, and controlling this identity. * Non-repudiability: Bind an entity to its actions

We hope that this proposed role of computer security can be achieved with the encouragement and support from all quarters, especially who are directly and indirectly involved in this project.

CHAPTER II
OBJECTIVES
1
PROJECT OBJECTIVES a. To apply Network Security knowledge obtained since Semester 1. b. To provide a secure email server by including some ads on security features in the email server. c. To reinforce knowledge and enhance problem-solving skills. d. To achieve the basic features of secure Email:

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Apply common cryptographic and hashing techniques on a message to ensure message confidentiality and integrity…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue five. Because Richman hosts an internet for employees to access information about the company and enroll in company benefits programs, and because Richman also hosts an extranet for its business partners, you must research and devise a method to secured networks and communications. This should include the network structure,…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 210

    • 516 Words
    • 3 Pages

    1.1 /2 Some mail may contain confidential or private information. This may include personal details or information about the businesses employees or contain business confidentiality information such as names and addresses of customers or information that is relative to the business, customers, and clients. Also, mails and packages have to be checked for suspicious features. Security procedures have to also be followed when dealing with mails and packages.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Prevent anonymous access on internal SMTP virtual servers and dedicated SMTP virtual servers for IMAP and POP clients.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Waves of targeted email attacks, often called phishing, are exploiting client side vulnerabilities in commonly used programs such as Adobe PDF Quick Time, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have access to the internet and the network.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    1.1 Identify legislation and codes of practice that relate to handling information in health and social care…

    • 291 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Gmail - a Case Study

    • 2461 Words
    • 10 Pages

    Webmail allows you to send and receive email from any computer in the world which is connected to internet just by using your email address and password. Webmails are based on hypertext mark up language (HTML). There are various internet browsers available for different platform which can be used to access your messages or send and receive email. Emails are stored on the webmail provider's server. All the information of the webmails are stored on the webmail server itself until it is deleted by user or by provider.…

    • 2461 Words
    • 10 Pages
    Good Essays