1 / 6

PKI and E-mail

PKI and E-mail. E-mail Considerations. Behind Firewall E-mail System Security On the Internet Simple Mail Transfer Protocol (SMTP). PKI Considerations. Assess Risk Administrative Overhead Ease of Use vs. Security Needs. Assess Risk. Sensitive Information (HIPPA)

vea
Download Presentation

PKI and E-mail

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PKI and E-mail

  2. E-mail Considerations • Behind Firewall • E-mail System Security • On the Internet • Simple Mail Transfer Protocol (SMTP)

  3. PKI Considerations • Assess Risk • Administrative Overhead • Ease of Use vs. Security Needs

  4. Assess Risk • Sensitive Information (HIPPA) • Personal Information (Identity Theft) • Proprietary Company Information

  5. Administrative • Obtaining the Digital Certificate • Cost of the Digital Certificate • Technical Support • Employee Leaves

  6. Ease of Use vs. Security Needs Find a Balance

More Related