Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
Ebook45 pages11 minutes

Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.

Topics include: review of security features such as Authentication, Integrity, Non-Repudiation, and Confidentiality, explanation of cryptographic features such as digital signature and encryption, how to obtain free email certificate and install it on Outlook and iPhone, configuring Outlook and iPhone for email encryption, and more (Article: ~3,100 words).

Table of Contents

Introduction
Part I: The “Theory” of Cryptographic Message Protection
What is Public Key Encryption?
What is Public Key Infrastructure?
What is S/MIME?
What is Digital Certificate?
What Is Digital Signature?
Security Features Provided by Digital Certificate: Difference between Encryption and Digital Signature
Security Features Provided by Digital Signature
Security Features Provided by Encryption
Part II: Implementing Email Protection
Obtaining Your Personal Email Certificate (Digital ID)
Configuring Outlook
Installing Email Certificate on iPhone
Configuring Exchange Email Account on iPhone
Sending Encrypted and Digitally Signed Email from Outlook
Sending Encrypted and Digitally Signed Email from iPhone
Obtaining Recipient Certificates
Conclusion
Encryption and Digital Signatures in Gmail
Resources
About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

LanguageEnglish
PublisherSlava Gomzin
Release dateJun 7, 2012
ISBN9781476285184
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
Author

Slava Gomzin

Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security at www.gomzin.com.

Read more from Slava Gomzin

Related to Securing Email Communication

Related ebooks

Security For You

View More

Related articles

Reviews for Securing Email Communication

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Securing Email Communication - Slava Gomzin

    Securing Email Communication

    How to Protect Your Correspondence from Wiretapping Using Free Tools

    Cyber Privacy Series

    Slava Gomzin

    Cover Photo and Design: Alisa Levy

    Smashwords Edition

    Copyright © 2012 Slava Gomzin

    Table of Contents

    Introduction

    Part I: The Theory of Cryptographic Message Protection

    What is Public Key Encryption?

    What is Public Key Infrastructure?

    What is S/MIME?

    What is Digital Certificate?

    What Is Digital Signature?

    Security Features Provided by Digital Certificate: Difference between Encryption and Digital Signature

    Security Features Provided by Digital Signature

    Security Features Provided by Encryption

    Part II: Implementing Email Protection

    Obtaining Your Personal Email Certificate (Digital ID)

    Configuring Outlook

    Installing Email Certificate on iPhone

    Configuring Exchange Email Account on iPhone

    Sending Encrypted and Digitally Signed Email from Outlook

    Sending Encrypted and Digitally Signed Email from iPhone

    Obtaining Recipient Certificates

    Conclusion

    Encryption and Digital Signatures in Gmail

    Resources

    Tools

    Articles

    Books

    Standards

    About the Author

    Introduction

    We often send and receive email messages containing confidential information. In fact, there

    Enjoying the preview?
    Page 1 of 1