Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

    • ¥600
    • ¥600

発行者による作品情報

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.

Topics include: review of security features such as Authentication, Integrity, Non-Repudiation, and Confidentiality, explanation of cryptographic features such as digital signature and encryption, how to obtain free email certificate and install it on Outlook and iPhone, configuring Outlook and iPhone for email encryption, and more (Article: ~3,100 words).

Table of Contents

Introduction
Part I: The "Theory" of Cryptographic Message Protection
What is Public Key Encryption?
What is Public Key Infrastructure?
What is S/MIME?
What is Digital Certificate?
What Is Digital Signature?
Security Features Provided by Digital Certificate: Difference between Encryption and Digital Signature
Security Features Provided by Digital Signature
Security Features Provided by Encryption
Part II: Implementing Email Protection
Obtaining Your Personal Email Certificate (Digital ID)
Configuring Outlook
Installing Email Certificate on iPhone
Configuring Exchange Email Account on iPhone
Sending Encrypted and Digitally Signed Email from Outlook
Sending Encrypted and Digitally Signed Email from iPhone
Obtaining Recipient Certificates
Conclusion
Encryption and Digital Signatures in Gmail
Resources
About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

ジャンル
コンピュータ/インターネット
発売日
2012年
6月7日
言語
EN
英語
ページ数
13
ページ
発行者
Slava Gomzin
販売元
Draft2Digital, LLC
サイズ
1
MB
Stop Using Email Stop Using Email
2021年
Good and Geeky Private Emails Good and Geeky Private Emails
2016年
Encryption Encryption
2016年
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012年
Hackproof Email Hackproof Email
2018年
CISA EXAM-Testing Concept-Digital Signature CISA EXAM-Testing Concept-Digital Signature
2016年
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016年
Hacking Point of Sale Hacking Point of Sale
2014年
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012年
Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data
2012年
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012年
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012年