Question

I need anyone help me solve these questions !! The answers should be your own word, NO Plagiarism !!

Please do not copy from a book or from the same site or from other students' answers. The work should be your own answers.

Please do not answer the handwriting and be a computer writing NO NO handwriting answers.

TO NO considered AS Plagiarism

3-Emaiis themost preferred-way of communication in many sectors-currently various threats to the information technologyframework.Explainin thevarious techniques (at least to protect the messages sent over emails.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

E Mail is most common communication mechanism in todays connected world of information technology. However it is prone to various threats while communicating over Email beyond organisations boundries. The most important of these which can damage the IT infrastructure are:

  • ?By sending email the sender can capture sensitive information about another user or organisation. This information can further be used to attack individual user or organisation for malicious intent. It may pretend to be a user which may not be right source of e mail. This information can be used to damage user or organistion.
  • It may get unauthorised access of the network or computing resources of organisation. Attack organisation information resources and send proprietry sensitive information outside over email. This may intentional malicious activity which may lead to legal actions to companies.

Techniques to protect messages for e mail communication: The following are the main techniques for safeguards the messages:

  • Security controls, policies, authorised access and awareness across organisation about security threats and severity of its harm.
  • Securing Email server, client and transmission of information through securty techniques like encryption, PKI, secured http protocols. In addition to this installing secured environment like firewall, intrusion detection, prevention and alerting mechanism can help avoid such threats.
  • Secured user login sessions, authentication of users. Encryption of e mail data before sending on internet.
Add a comment
Know the answer?
Add Answer to:
I need anyone help me solve these questions !! The answers should be your own word,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • I need any IT expert - Computer Science - to help me solve these questions !!...

    I need any IT expert - Computer Science - to help me solve these questions !! Please do not copy from a book or from the same site or from other students' answers. The work should be your own answers. Please do not answer the handwriting and be a computer writing NO NO handwriting answers. Please do not copy from a book or from the same site or from other students' answers. The work should be your own answers. TO...

  • I need new and unique answers, please. (Use your own words, don't copy and paste), Please...

    I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. Answer the following Questions: ( in details) 2. Briefly discuss the techniques used by hospitals to prepare patients for surgery and make this medical event less stressful. the techniques used by hospitals to prepare patients for surgery and make this medical event less stressful. ( in details)

  • Pleaaase help me :(( I need new and unique answers, please. (Use your own words, don't...

    Pleaaase help me :(( I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. 1. Describe the similarities and differences between hepatitis B and hepatitis C. 2. What are the most common blood-borne infections that concern occupational health specialists?

  • I need new and unique answers, please. (Use your own words, don't copy and paste), Please...

    I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. Word limit: 300- 500 words total. 1. What is the Screening Survey? 2. Describe the screening test procedure for tuberculosis (TB) in hospitals?

  • I need new and unique answers, please. (Use your own words, don't copy and paste), Please...

    I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. Word limit: 300- 500 words total. 1. What is the Screening Survey? 2. Describe the screening test procedure for tuberculosis (TB) in hospitals?

  • I need new and unique answers, please. (Use your own words, don't copy and paste), Please...

    I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. Imagine that you are working in a healthcare facility and answer 1 (one) of these questions under HOW do you enable PATIENTS and other CUSTOMERS to seek information and support? HOW do you enable them to obtain HEALTH CARE SERVICES from you? What are your KEY means of PATIENT and other CUSTOMER support, including your KEY...

  • I need new and unique answers, please. (Use your own words, don't copy and paste), Please...

    I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. Q1: What is waterborne disease? List out the pathogens associated with waterborne diseases. Q2: Select any pathogen that is associated with waterborne diseases and research online or at the library any waterborne disease case study associated with the pathogen selected. Prepare a word document discussing what you learned from the study of the outbreak selected.

  • I need new and unique answers, please. (Use your own words, don't copy and paste), Please...

    I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. Answer the following Questions: ( in details) 1. Patients about to undergo surgery experience greater disturbance and stress than in almost any other medical situation. Provide three elements that make surgery particularly stressful for patients. 2. Briefly discuss the techniques used by hospitals to prepare patients for surgery and make this medical event less stressful.

  • Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...

    Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Man-in-the-middle attack Consider the following statement: The secure socket layer (SSL) protocol allows for secure communication between a client and a server. There are known flaws in the SSLv2 protocol. A man-in-the-middle attacker can force the communication to a less secure level and then attempt break the encryption. The attacker can also truncate encrypted messages. These flaws have been fixed in SSLv3 (TLSv1)....

  • I need new and unique answers, please. (Use your own words, don't copy and paste), Please...

    I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. Topic: Gender Gap "Do you think that women's participation to the labor force influences inequality between the sexes? " Use your own words and be sure to support your statements with logic and arguments.

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT