Description

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.

Key Features

* Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users

Table of Contents

Introduction Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers Introduction Essential Concepts Servers, Services, and Clients Authentication and Access Control Hackers and Attack Types What Do Hackers Do? Attack Types Overview of E-mail Clients and Servers Understanding a Mail User Agent and a Mail Transfer Agent The Mail Delivery Agent When Are Security Problems Introduced? History of E-mail Attacks The MTA and the Robert Morris Internet Worm MDA Attacks Analyzing Famous Attacks Case Study Learning from Past Attacks Viruses Worms Types of Worms Trojans Illicit Servers Differentiating between Trojans and Illicit Serversxiv Contents E-mail Bombing Sniffing Attacks Carnivore Spamming and Security Common Authoring Languages Protecting Your E-mail Protecting E-mail Clients Third-party Applications Encryption Hash Encryption and Document Signing Summary FAQs Chapter 2: Securing Outlook 2000 Introduction Common Targets, Exploits, and Weaknesses The Address Book The Mail Folders Visual Basic Files Attacks Specific to This Client Security Updates Enabling Filtering Junk E-mail Filtering Keywords Mail Settings and Options HTML Messages Zone Settings Enabling S/MIME Why You Should Use Public Key Encryption Installing and Enabling Pretty Good Privacy (PGP) Understanding Public Key Encryption Summary FAQs Chapter 3: Securing Outlook Express 5.0 and Eudora 4.3 Introduction Outlook Express for Windows Security Settings Attachments

Details

No. of pages:
476
Language:
English
Copyright:
© 2000
Published:
Imprint:
Syngress
Print ISBN:
9781928994237
Electronic ISBN:
9780080477534