Top-Rated Free Essay
Preview

Lab Assessment Worksheet: Overview of S/MIME E-Mail Protocol

Satisfactory Essays
647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab Assessment Worksheet: Overview of S/MIME E-Mail Protocol
IS3230 Lab 9 Assessment Worksheet
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
15 May, 2014

1. Before S/MIME, administrators used a widely accepted e-mail protocol to transfer messages, Simple Mail Transfer Protocol (SMTP), which was inherently less secure. With S/MIME, administrators now have an e-mail option that helps provide greater security than SMTP, enabling widespread and secure e-mail connectivity.
S/MIME provides two security services:
•Digital signatures
•Message encryption
S/MIME solutions require a PKI to provide digital certificates with public key/private key pairs and enable certificate mapping in the Active Directory directory service. The S/MIME standard specifies that digital certificates used for S/MIME conform to the International Telecommunications Union (ITU) X.509 standard. S/MIME version 3 specifically requires that digital certificates conform to version 3 of X.509. Because S/MIME relies on an established, recognized standard for the structure of digital certificates, the S/MIME standard builds on that standard's growth and thus increases its acceptance. You can implement a PKI to support S/MIME in one of two ways: provision the internal certificate infrastructure to an external organization, or use Certificate Services in Microsoft Windows Server 2003/2008.
2. A Certification Authority (CA) is an organization whose function is to issue certificates. Its role is to confirm the identity of the party who is the subject of the certificate and attest that the public key in the generated certificate is the public key of the identified party.
3. Any time a security measure is based on trust, an attacker has the ability to subvert that trust and use it to his advantage. Trust subversion is any act that takes advantage of a relationship of trust between two parties. This encompasses specific spoofing attacks, masquerading, Man-in-the-middle and other attacks. By appearing as a trusted party, an attacker can gain important leverage over a situation and can often gain confidential information (phishing/sniffing) or even infect a target computer with malware.
4. EFS
5. Yes, once a file has been initially encrypted, file sharing is enabled through a new button in the user interface.
6. A key recovery system
7. SHA-1, or "Secure Hash Algorithm," is a hash algorithm, which means that it reduces the plaintext to a hash -- in this case, a 160 bit "signature" of the data. Use that any place you need to be sure the data is the same on both ends, but don't care who snoops it in the middle. Most people use md5 for this.
3DES, running Data Encryption Standard 3 times, is a symmetric block cipher. A block cipher breaks up the plaintext into pieces, and runs a reversible (two-way) encryption on it so that if you have the key, you can recreate the data from the cyphertext. This differs from SHA in that you can NOT recreate the data from an SHA hash.
8. Symmetric Encryption - A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key.
Asymmetric Encryption - The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. Asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it.
9. Enterprises must take the time to look carefully at encryptions.
10. PGP is a proprietary encryption solution, and the rights to its software are owned by Symantec. GPG is another solution that follows the OpenPGP standards to provide an interface for end users to easily encrypt their files.

You May Also Find These Documents Helpful

  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ibm 211 Week 3

    • 4383 Words
    • 18 Pages

    1 2 2 2 3 4 Overview Key prerequisites Planned availability date Description Program number Publications 4 5 14 16 16 Technical information Ordering information Terms and conditions Prices Order now…

    • 4383 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    2. Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2670 Final Exam Paper

    • 408 Words
    • 2 Pages

    3) The HTTP and HTTPS protocols are often used to access email using a web browser.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Simple Mail Transfer Protocol. This is used to send and receive email messages between clients.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    I first learn about “trusts” working in my father’s grocery store. Some customers would come into the store and ask if they could get X or Y to trust. My father would get out this thick book and write the name of the customer and the list of products. He would hand over the product without collecting the money; back then, I was looking for the customer to hand over the money, but he/she would quietly exit the store. This was not good for business, because when he goes to the market place to purchase his goods, he always have to pay for his products. A concept I am still trying to grasp because at age 89, he continue to do the same thing.…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. The first Threat is Viruses have been around for years, but that doesn't make them any less dangerous or easy to eradicate. New, more destructive viruses and worms are being unleashed at an alarming rate.…

    • 546 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3.1 Essay

    • 488 Words
    • 2 Pages

    CAs are used to issue trusted certificates, digital signatures or keys to the person using it. This way we can have systems in place that’ll revoke any certificate coming from a non-trusted source (Truth, S, 2011). For example, an attacker may have generated their own key or certificate but it isn’t recognised as a trusted source and therefore our systems can deny it.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Emails can be used to send information to individuals or a whole company, there are many different facilities within email software that can ensure the recipient has read the email this is important if the email contained time critical information. Also as email can be used as a legal form of communication it can be used to send contractual information and purchase orders.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 260

    • 662 Words
    • 3 Pages

    ______ ESMTP ______ is an improved version of the standard e-mail protocol that provides greater support for embedded graphics and attachments in e-mail.…

    • 662 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    The certificate authority (CA) is the trusted authority for certifying individuals' identities and creating an electronic document indicating that individuals are who they say they are.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    Sending and receiving, emails are useful as the sender can attach documents to the email they sent. These can be word documents, spreadsheets, sound files or images. Bearing in mind when sending an email it's important to know the competence of the recipient for that email - there is no point in sending email if the person receiving it can’t understand or doesn't know how to open it!…

    • 2519 Words
    • 11 Pages
    Good Essays
  • Good Essays

    To begin with, murder under trust is the killing someone when they trust one; when they put their life on one’s hands for protection. “He’s here in double trust: First, as I am his kinsman and his subject, Strong both against…

    • 661 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Baseball: America's Sport

    • 880 Words
    • 4 Pages

    Baseball is what many people call, “America’s Sport.” Many enjoy setting in front of their television, with a bag of chips and a cold drink while they watch their favorite professional team. People become fans for different reasons; some enjoy being outside, hanging out with friends or eating a stadium hot dog. There is a group of people that find baseball to be more than that. For them it brings them back to a time of playing with their “buddies,” going to get ice cream after the big win or maybe it’s memory of playing baseball when they were young, because after all little league baseball, is first and foremost meant to be fun.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Trust

    • 501 Words
    • 2 Pages

    Trust is the very thing that everybody in this world desires, or at least should desire from one another. Who wants to have a friendship or relationship without trust? Nobody does. Without trust, there is no friendship, and without friendship, there is no love. I believe that trust is an even greater compliment than to be loved! I believe George Macdonald said it best when he stated "To be trusted is a greater compliment than to be loved." When I read this quote for the first time, I thought to myself, "Wow that is so true. How can you be loved if you are not trusted first?"…

    • 501 Words
    • 2 Pages
    Good Essays