Digital data protection is important to protect from security breaches below.
- Data Theft
-
Denial of service
-
Integrity Attacks
Data Theft and Email:
Digital information categorised into two ways structured and unstructured data.
Structured Data:
- Structured Data controls available for typical data.
-
Structured data stored in database.
Unstructured Data:
Unstructured data's like email and file attachments, word/pdf, excel, pictures and videos.
A look at Deficiency:
- A weak user authentication and permissions.
- Transmission in the clear.
- No controls of intermediate servers.
- No control over redistribution.
Sieve RFC 5228:
Sieve is a language for filtering e-mail messages. Sieve is designed to be implementable on either a mail client or mail server. Sieve is meant to be extensible, simple and independent of access protocol, mail architecture and operating system.
- Email messages unencrypted can be hacked.
- Sender emails copied send to email server, sender email server copy the email in mail server and send to recipients email server coped email and send to original recipient.
- Email has no control on email server.
- Always whenever you are using Gmail, outlook, yahoo, they will download a copy to their own mail servers.
- Email servers are owned by third party server.
- After 180 days your emails are considered 'abandoned'.
- Email older than 6 month - no warranty or portable cause required.
- By the means of wire tapping email servers hacked by hackers.
The Gateway of Email Server:
Email server has gateway as SMTP email, 90% of Malware smuggled in via SMTP email gateway.
SMTP:Simple Mail Transfer Protocol:
Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/ IP network.
SMTP port 587 is used with encryption messages with wrapper.
- SMTP Port 25 is the default port used for relaying.
-
SMTP Port 465 should no longer be used at all.
- SMTP Port 2525 used when all other port is blocked.
SMTP Inherent vulnerability:
- SMTP vulnerabilities is unsecured storage and transmission.
-
SMTP is lack of redistribution controls.
-
SMTP is lack of temporal.
Partial solutions:
- Transmission Encryption which will encrypt the connection but this can be compromised.
- Bulletin board systems
-
Add on message encryption
-
Enhanced authentication
Bulletin board solutions for secure email:
- Recipients to get email notifications to log into a Web portal for their messages.
- Bulletin boards are user friendly.
- Bulletin boards are high quality and encrypted.
Add on Message:
- Add on message is used to stop Phishing.
- But add on message not having capacity to stop spear Phishing.
- Add on message encrypt stored and sent emails.
Enhanced authentication:
Enhanced authentication will be used to prevent from any attack by hacker.
Root cause:
Generally unstructured data files can be easily copied from victim to attacker. So cyber security measures are important.
The Fix:Securing files By default:
The fix will be only using encrypted Internet connection, so we need to follow below steps,
Step:1: Application file will generate encryption key specific to files.
Step:2: Application automatically locks the file
Step:3: Application able to hide true file name.
Step:4: Application will create a new special shared key.
Step:5: Also application creates a specific file key to user.
Secure Data at Creation:
Granularly encrypt each data object with AES 256 symmetric encryption.
- Absio offers email encryption service.
-
Secures data at rest.
-
Encrypt each file with its own key.
-
Distributed key management.
Hill Station view: