Page 176 - StudyBook.pdf
P. 176

160    Chapter 3 • Communication Security: Remote Access and Messaging

                   In data modification, data is intercepted by a third party (one that is not
                      part of the initial communication), modified, and sent through to the party
                      it was originally intended for.

                   Using SSH helps protect against many different types of attacks, including
                      packet sniffing, IP spoofing, and the manipulation of data by unauthorized
                      users.

             E-mail Security


                   PGP and S/MIME are used for encrypting e-mail.

                   Spam is unsolicited advertisements sent via e-mail.
                   When PGP is installed, plug-ins for Microsoft Outlook, Outlook Express,
                      ICQ, Netscape, and other programs can then be installed, allowing users to
                      encrypt, decrypt, and sign messages sent through these e-mail packages.
                   Users should never follow any instructions within an e-mail that tells them
                      to delete a certain file or send information to an unknown party.

                   Administrators of e-mail systems should invoke spam-whacking solutions,
                      recursive DNS tests, and hardened SMTP relay settings to ensure their e-
                      mail systems are less subject to exploitation.


































          www.syngress.com
   171   172   173   174   175   176   177   178   179   180   181