Who’s Peeking at Your Files? A Guide to Personal Data Security Some Possible Threats Email Interception Email Spoofing Web Data Interception Network & Volume Invasion Marketing Data / Spam & Junk Mail Viruses, Worms, Trojan Horses Password Cracking More Possible Threats Mail bomb
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
A Guide to Personal Data Security
Joe Lewis - Xcert International Inc.
Running a script on a server that receives email traffic, monitoring emails for certain keywords or number patterns. (I.E. “bomb + president” or credit card number patterns)
Stealing someone’s user id and password to gain access to their email account.
Digital certificates authenticate you as the sender and are extremely difficult to forge. Allows very strong encryption of email communications.
“Pretty Good Privacy” allows strong encryption of your text. Can be incorporated easily into any text oriented program.Email Interception
Clicking on the Security button in Netscape Communicator opens the Security Window below:
This will describe how to encrypt a
message using Digital Certificates with Netscape Communicator.
An email that has a digital certificate attached will display this icon in Communicator. You can click on the icon to examine the cert. Certs emailed to you are automatically added to Communicator’s database.
You can search for certificates on public directories (LDAP) directly from within Communicator
Certificate Fingerprint:E4:58:C8:8F:B5:90:4C:AC:AB:79:9C:6A:32:0C:3E:4EEmail Spoofing
List of default trusted CA’s in Communicator
Note: Attempting to enter a secure site that is not signed by a valid or default CA will result in a cautionary error message.
For further information, contact: