All
All

NIST Guidelines on Electronic Mail Security

1,018.7 KB | 3 files |  PDF, DOC

The popularity of e-mail makes it a prime target for attackers. This document addresses the security issues of mail servers and mail clients, including Web-based access to mail.

Electronic mail is perhaps the most popularly used system for exchanging business information over the Internet (or any other computer network). At the most basic level, the email process can be divided into two principal components: (1) mail servers, which are hosts that deliver, forward, and store email; and (2) mail clients, which interface with users and allow users to read, compose, send, and store email. This document addresses the security issues of mail servers and mail clients, including Web-based access to mail.

Mail servers and user workstations running mail clients are frequently targeted by attackers. Because the computing and networking technologies that underlie email are ubiquitous and well-understood by many, attackers are able to develop attack methods to exploit security weaknesses. Mail servers are also targeted because they (and public Web servers) must communicate to some degree with unreliable third parties. Additionally, mail clients have been targeted as an effective means of inserting malware into machines and of propagating this code to other machines. As a result, mail servers, mail clients, and the network infrastructure that supports them must be protected.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Guidelines on Electronic Mail Security.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

Global1 Virtual Meeting Checklist

Like any meeting, a virtual meeting should be well planned and engaging for all those who attend. Unfortunately, most who take part in frequent virtual meetings don’t often find that is the case. ...  More >>

Effective Meeting Checklist

Learn how to plan and execute an efficient, effective and productive meeting using this meeting checklist. ...  More >>

Book Excerpt 'Google Business Solutions All-in-One For Dummies Excerpt

This excerpt, “Selling More with Google Analysis Tools,” comes from Chapter 3 and covers Google Analytics, AdWords graphs and SEO. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data


Close
Thanks for your registration, follow us on our social networks to keep up-to-date