SHARE
Facebook X Pinterest WhatsApp

NIST Guidelines on Electronic Mail Security

NIST Guidelines on Electronic Mail Security The popularity of e-mail makes it a prime target for attackers. This document addresses the security issues of mail servers and mail clients, including Web-based access to mail. Electronic mail is perhaps the most popularly used system for exchanging business information over the Internet (or any other computer network). […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Aug 10, 2009

NIST Guidelines on Electronic Mail Security

The popularity of e-mail makes it a prime target for attackers. This document addresses the security issues of mail servers and mail clients, including Web-based access to mail.


Electronic mail is perhaps the most popularly used system for exchanging business
information over the Internet (or any other computer network). At the most basic level,
the email process can be divided into two principal components: (1) mail servers, which
are hosts that deliver, forward, and store email; and (2) mail clients, which interface
with users and allow users to read, compose, send, and store email. This document
addresses the security issues of mail servers and mail clients, including Web-based
access to mail.

Mail servers and user workstations running mail clients are frequently targeted by
attackers. Because the computing and networking technologies that underlie email are
ubiquitous and well-understood by many, attackers are able to develop attack methods to
exploit security weaknesses. Mail servers are also targeted because they (and public
Web servers) must communicate to some degree with unreliable third parties.
Additionally, mail clients have been targeted as an effective means of inserting
malware into machines and of propagating this code to other machines. As a result, mail
servers, mail clients, and the network infrastructure that supports them must be
protected.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Guidelines on Electronic Mail Security.pdf

Recommended for you...

Enterprise Software Startups: What It Takes To Get VC Funding
Tom Taulli
Aug 25, 2022
Top RPA Tools 2022: Robotic Process Automation Software
Jenn Fulmer
Aug 24, 2022
Metaverse’s Biggest Potential Is In Enterprises
Tom Taulli
Aug 18, 2022
The Value of the Metaverse for Small Businesses
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.