Chat with us, powered by LiveChat cry - STUDENT SOLUTION USA

DiscusiionSUBJECT: Cryptography

DISCUSSION

Review attached pdf document.

After reading chapter 19, determine the impact that cryptography plays on email exchange.  Should a company encrypt their email traffic and what would be the disadvantage for encrypting the data

Make sure to cover 300 words and 2 references

Stallings_8e_Accessibl
e_fullppt_19.pdf

Cryptography and Network Security:

Principles and Practice
Eighth Edition

Chapter 19

Electronic Mail Security

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 19.1 Function Modules and Standardized

Protocols Used between them in the Internet Mail

Architecture

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Email Protocols

• Two types of protocols are used for transferring email:

– Used to move messages through the Internet from

source to destination

▪ Simple Mail Transfer Protocol (SMTP)

– Used to transfer messages between mail servers

▪ IMAP and POP are the most commonly used

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

SMTP

• Simple Mail Transfer Protocol

• Is a text-based client-server protocol

• Encapsulates an email message in an envelope and is

used to relay the encapsulated messages from source to

destination through multiple MTAs

• Was originally specified in 1982 as RFC 821

• The term Extended SMTP (ESMTP) is often used to refer

to later versions of SMTP

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Mail Access Protocols

POP3

• Post Office Protocol

• Allows an email client to

download an email from

an email server (MTA)

• POP3 user agents

connect via TCP to the

server

• After authorization, the UA

can issue POP3

commands to retrieve and

delete mail

IMAP

Internet Mail Access

error: Content is protected !!