Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Content-based control of HTTPs mail for implementation of IT-convergence security environment
Hong Y., Kim D. Journal of Intelligent Manufacturing25 (2):231-239,2014.Type:Article
Date Reviewed: Apr 15 2015

Many organizations face the challenging task of balancing the confidentiality of their email messages with the enforcement of their security policies to prevent data loss, or to comply with legal email archiving obligations that mandate preserving and making searchable all individual emails. To protect confidentiality, web mail systems, such as Gmail, have adopted the HTTPS protocol, using secure sockets layer (SSL) certificates and encryption. This makes it hard for organizations to log or inspect the content of email and to prevent the loss of sensitive data such as customer social security numbers (SSNs) or mission-critical data.

This paper leverages a man-in-the-middle (MITM) attack on the SSL protocol, where the certificate is faked by another node between the mail client and the web mail server. It introduces an email security proxy server within an organization to serve as a certificate authority (CA); all client PCs are forced to use this CA’s public key for encrypting their email messages. The proxy server can decrypt the client’s email messages for logging and blocking to preserve content and prevent loss. This can prevent data theft and achieve compliance with email archiving and searchability mandates.

This system was implemented at LG Chemistry Company and was shown to be scalable. However, it is imperative that organizations inform employees of their policies, obligations, and justifications for technical solutions like this. Otherwise, employees will continue to have the illusion of “secure” and “private” email communication. The transparency will give employees the choice to opt out of the web mail services within the organization.

Reviewer:  Soon Ae Chun Review #: CR143349 (1509-0846)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Electronic Mail (H.4.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy