Proof of Submission in an Electronic Mail System
Proof of submission is the ability of the sender to ascertain to the receiver that the email message has left his control. To achieve these, the sent email is stored in the senders out box and is passed on to the mail server. The mail server has a private, public key pair, calculates a message digest of the body of the email, and its metadata such as the time received and its identity. The mail server then signs the mail by encrypting the digest with its private key and sends the result to the sender of the email.
Non-Repudiation in an Electronic Mail System
This is a scenario where the receiver can easily proof to a third party that the sender actually did send the email message. This property eliminates the chance that the sender of the email will deny sending such an email message. To achieve non-repudiation, the sender must encode the whole email with a private key.
Importance of Non Repudiation in an E-Commerce System
Non repudiation is extremely important in e commerce because it acts as proof of communication and guards against denial by one or both parties of having participated in the communication. For instance, in a mail order company that allows its customers to order via email, non repudiation is a basic requirement. This helps in maintaining the customers email orders as proof of purchase, and protect the company against the customer denying the purchase of goods (Balladelli and Clercq, 2001).
How to Download an Email with Its Contents Hidden
Steganography also referred to as the dark cousin of cryptography is the art of writing hidden messages in a way that no one can suspect the existence of the message. This is achieved through hiding a digital file by embedding it inside another digital file such as jpg, bmp or audio file then send with email as an attachment.
How Ipsec Prevents Packet Sniffers
In IPSec, all traffic including login traffic is encrypted meaning an attacker cannot steal what he cannot see. IPSec prevents the attacker from knowing when potentially valuable information is on the network thus making it extremely difficult to break into the server. In a wireless network, IPSec encryption should be mandatory because it is easy to build an antenna that picks wireless traffic from a mile or more away from a building. Encryption protects from brute force attacks, man in the middle attacks, and network sniffer attacks (Lewis, 2004).
How SSL Prevents Packet Sniffers
SSL designed by Netscape protects servers and users against internet intruders using server authentication with a digital certificate, which highly discourages hackers. Transmission privacy with encryption guards against eavesdropping, while data integrity across the end to end connections eliminates vandalism hence guarding against bogus packets (Jamsa and Klander, 2002).
References
Balladelli, M., & Clercq, J. D. (2001). Mission-critical Active Directory architecting a secure
and scalable infrastructure for Windows 2000. Woburn, Mass.: Butterworth-Heinemann.
Jamsa, K. A., & Klander, L. (2002). Hacker proof: the ultimate guide to network security (2nd
ed.). Las Vegas, NV: Thomson.
Lewis, M. (2004). SQL server security distilled (2nd ed.). Berkeley, Calif.: Apress.