Section 21.204 Email Secuirty Flashcards

Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Email Security

A

Encompasses techniques and protocols to protect email content, accounts, and infrastructure from unauthorised access, loss, or compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key email security techniques

DKIM (DomainKeys Identified Mail)

A

Allows the receiver to verify the source and integrity of an email by adding a digital signature to the email headers

● The recipient server validates the DKIM signature using the sender’s public cryptographic key in the domain’s DNS records

● Benefits:
○ Email authentication
○ Protection against email spoofing
○ Improved email deliverability
○ Enhanced reputation score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key email security techniques

SPF (Sender Policy Framework)

A

Prevents sender address forgery by verifying the sender’s IP against
authorised IPs listed in the sender’s domain DNS records

● A receiving server checks if the sender’s IP is authorized in the SPF record before accepting the email

● Benefits:
○ Preventing email spoofing
○ Improving email deliverability
○ Enhancing the domain’s reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key email security techniques

DMARC (Domain-based Message Authentication, Reporting and Conformance)

A

DMARC detects and prevents email spoofing by setting policies for email
sending and handling failures

● DMARC can work with DKIM, SPF, or both

● Implementation helps protect against:
○ Business email compromise attacks
○ Phishing
○ Scams
○ Cyber threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key email security techniques

Email Gateway Protocol Configuration

A

Email gateways serve as entry and exit points for emails, facilitating secure and efficient email transmission

● They use SMTP (Simple Mail Transfer Protocol) to send and receive emails

● Email gateways handle email routing, email security, policy enforcement, and email encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Email Gateway Deployment Options

On-Premises Email Gateway

A

A physical server located within an organisation’s premises, offering full control but requiring maintenance and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Email Gateway Deployment Options

Cloud-Based Email Gateway

A

Hosted by third-party cloud service providers, providing scalability but limited control over configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Email Gateway Deployment Options

Hybrid Email Gateway

A

Combines on-premises and cloud-based gateways for a balance between control and convenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spam Filtering

A

Spam filtering detects and prevents unwanted and unsolicited emails from
reaching users’ inboxes

■ Techniques:
● Content analysis
● Bayesian filtering
● DNS-based sinkhole list
● Email filtering rules

Emails with spam-like keywords are flagged and often moved to the spam folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly