1,387
21
Essay, 2 pages (300 words)

Computer security essay samples

Every email message is made up of the header and the body. The header has information about the origin of the email. The origin details include the address of the sender and who sent the mail. The body contains the message and the attachments. For a client to send an email, he/she must connect to the server to receive and send the messages. Different software allows clients to accomplish this. The server of email is a computer that runs on a windows or a UNIX operating system (Harwood, 2011). The computer has the software that allows it to manage the transmission and holding of messages. Receiving and sending the emails requires the internet through mail services like Yahoo and Gmail.
The email servers exchange emails. Information can leak in the server because all the computers that share one server allow easy access of the information. It is possible to disable the HTTP access but still information can be diverted to unintended locations. Organizations that use Microsoft Outlook for mails are vulnerable to information leak because people can synchronize their devices to receive information of the company. Information leak could also occur through SMTP (Simple Mail Transfer Protocol).
Preventing information leak is important because information is the most important resource for the organization. Preventive mechanisms involve the use of electronic mail message classifications. For the SMTP protocol, it is important to use the SSL to prevent information leakage (Shabtai et al., 2012). The operating system and the mail server software should always be up to date. The hardware must also be in a good working condition. The organization must also consider a single point that allows entry of electronic mails. Developing an incidence response team that has action plans is also an important part in preventing information leakage through electronic mail.

References

Harwood, M. (2011). Security strategies in Web applications and social networking. Sudbury, MA: Jones & Bartlett Learning.
Shabtai, A., Elovici, Y., & Rokach, L. (2012). A survey of data leakage detection and prevention solutions. New York: Springer.

Thank's for Your Vote!
Computer security essay samples. Page 1
Computer security essay samples. Page 2
Computer security essay samples. Page 3

This work, titled "Computer security essay samples" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Computer security essay samples'. 14 November.

Reference

AssignBuster. (2021, November 14). Computer security essay samples. Retrieved from https://assignbuster.com/computer-security-essay-samples/

References

AssignBuster. 2021. "Computer security essay samples." November 14, 2021. https://assignbuster.com/computer-security-essay-samples/.

1. AssignBuster. "Computer security essay samples." November 14, 2021. https://assignbuster.com/computer-security-essay-samples/.


Bibliography


AssignBuster. "Computer security essay samples." November 14, 2021. https://assignbuster.com/computer-security-essay-samples/.

Work Cited

"Computer security essay samples." AssignBuster, 14 Nov. 2021, assignbuster.com/computer-security-essay-samples/.

Get in Touch

Please, let us know if you have any ideas on improving Computer security essay samples, or our service. We will be happy to hear what you think: [email protected]