19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 13: Communication and Messaging Systems<br />

In addition to testing your antivirus software, you can attack e-mail systems<br />

using other tools I cover in this book. Metasploit (www.metasploit.com)<br />

enables you to discover missing patches in Exchange and other servers that<br />

hackers could exploit. Brutus (www.hoobie.net/brutus/) enables you to<br />

test the cracking of web and POP3/IMAP passwords.<br />

General best practices for minimizing<br />

e-mail security risks<br />

The following countermeasures help keep messages as secure as possible.<br />

Software solutions<br />

The right software can neutralize many threats:<br />

✓ Use malware-protection software on the e-mail server — better, the<br />

e-mail gateway — to prevent malware from reaching e-mail clients. Using<br />

malware protection on your clients is a given.<br />

✓ Apply the latest operating system and e-mail application security<br />

patches consistently and after any security alerts are released.<br />

✓ Encrypt (where’s it reasonable). You can use S/MIME or PGP to encrypt<br />

sensitive messages or use e-mail encryption at the desktop level or<br />

the server or e-mail gateway. You can also use SSL/TLS via the POP3S,<br />

IMAPS, and SMTPS protocols. A better option may be to use an e-mail<br />

security appliance or cloud service that supports the sending and<br />

receiving of encrypted e-mails via a web browser over HTTPS.<br />

Don’t depend on your users to encrypt messages. Use an enterprise<br />

solution to encrypt messages automatically instead.<br />

Make sure that encrypted files and e-mails can be protected against<br />

malware.<br />

• Encryption doesn’t keep malware out of files or e-mails. You just<br />

have encrypted malware within the files or e-mails.<br />

• Encryption keeps your server or gateway antivirus from detecting<br />

the malware until it reaches the desktop.<br />

✓ Make it policy for users not to open unsolicited e-mails or any attachments,<br />

especially those from unknown senders, and create ongoing<br />

awareness sessions and other reminders.<br />

✓ Plan for users who ignore or forget about the policy of leaving unsolicited<br />

e-mails and attachments unopened. It will happen!<br />

267

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!