Preface
About the AuthorS
Acknowledgements
Contents
Glossary of Abbreviations
Chapter 1: E-mail: Can we live without it?
Dependency without a guarantee
The implications of dependence
Takeaways
Chapter 2: E-mail threats and attacks
Mass-mailed malware
Spams and scams
There’s something phishy going on
Takeaways
Chapter 3: Securing the client
General guidelines
Web-based clients
Mobile clients
Chapter 4: Safety in transit
Protocols
Countermeasures
Takeaways
Chapter 5: Server side security
Firewall
Authenticated access
Connection filtering
Address filtering
Content filtering
Challenge/response
E-mail gateway
Relaying
UBE by attachment
Takeaways
Chapter 6: E-mail archiving
Archiving because we want to
Archiving because we have to
Takeaways
Chapter 7: Ethereal e-mail
Takeaways
Chapter 8: Risking our reputation?
Going down in history
Just having a laugh?
Putting it in a policy
Takeaways
Appendix: additional notes
Domain Name System (DNS)
DomainKeys
Architectures
Additional Secure Sockets Layer (SSL) certificate warning examples
Putting it all together
ITG Resources