IT Security

Thursday, December 4, 2008

The Knowledge of Email Security

Over the past couple of decades, email has become one of the world's leading communications mediums, perhaps even outpacing the telephone and traditional mail service.

Unfortunately, over this same time span, email has proven itself to be highly vulnerable to outside influences, including individuals and organizations that seek to cause some form of technological damage or hope to make money in an illegal fashion. As a result, security has become an increasingly important issue for all email users.

Email Threats

Although email security is often viewed as a single issue, it is actually a conglomeration of several different threats that work individually to damage computers and defraud recipients, as well as to undermine the effectiveness, reliability and trust of email systems. Email threats can be divided into several distinct categories:

  • Viruses, Worms and Trojan Horses: Delivered as email attachments, destructive code can devastate a host system's data, turn computers into remote control slaves known as botnets and cause recipients to lose serious money. Trojan horse keyloggers, for example, can surreptitiously record system activities, giving unauthorized external parties access to corporate bank accounts, internal business Web sites and other private resources.
  • Phishing: According to the Anti-Phishing Working Group — a trade organization that consists of financial organizations, software publishers and other concerned parties — phishing attacks utilize social engineering to steal consumers' personal and financial data. The attacks rely on "spoofed" emails that direct recipients to bogus Web sites that are designed to trick them into revealing confidential financial data such as credit-card numbers, account usernames, passwords and Social Security numbers. Phishing perpetrators typically operate by hiding under phony identities that they have stolen from banks, online merchants and credit-card companies.
  • Spam: Although not an overt threat like a virus-infected attachment, junk email can quickly overwhelm an inbox, making it difficult or even impossible for its owner to view legitimate messages. The spam problem has gotten so bad that it is commonplace for users to abandon email accounts that are overrun with spam rather than try to fight the problem. Spam is also the delivery medium of choice for both phishers and virus attackers. So just how bad is the problem in terms of numbers? Tens of billions of spam messages are sent every day.

Email Safeguards

Protecting email users and their systems from attackers is a 24/7 job that requires the use of multiple security tools:

  • Client Security: Virtually all major email clients now offer security settings, anti-spam tools, phishing filters and other features that are designed to snare and isolate dangerous messages before they can inflict harm. Email users should investigate all of these features and use them as their first line of defense.
  • Firewall: A firewall can bolster email security by filtering out malware-laden attachments and other types of unwanted material that don't meet pre-configured rules.
  • Encryption: Rendering messages indecipherable to unauthorized recipients is a popular way of protecting outbound emails. Encryption software isn't perfect, however, since even the best products consume both processor speed and storage space. Users can also lose or forget passwords. Encryption can be handled by the firewall or additional software.
  • Anti-Virus Tools: Leading anti-virus products and services generally do a good job of spotting and removing viruses, worms and Trojan horses from incoming email messages.
  • Spam Filters: A good spam filter can differentiate between legitimate email and spam, freeing a user's inbox from mounds of digital debris. A drawback to this technology is that a poor spam filter, or one that has not been properly tuned, will remove a certain number of legitimate emails from a user's view while letting some spam pass through untouched. Improved spam-recognition technologies are making spam filters more accurate — most vendors now promise 99 percent-plus accuracy rates — but even the best spam filter will incorrectly categorize at least some emails.
  • Education: One primary email-defense tool is education. Users who are aware of email threats are less likely to open potentially virus-infected attachments, click phishing links or perform other risky actions.

Email threats will continue to exist for as long as there are people and organizations that thrive on the misery they inflict upon others. Therefore, the practices and tools that constitute email security are likely to exist for as long as email itself.

Configuring VoIP [ Cisco Vs Maipu]

In the VoIP (Voice over IP) configuration, there is a conception dial-peer that is used to distinguish different types of session segments. There are two kinds of dial-peers:
POTS — A traditional telephone network peer, such as commonly used
telephone interfaces, PSTN telephone line interface (Z interface), etc.
VoIP — IP network peers (passing via the IP network, related with the
remote telephone segment.)

Seeing the two kinds of dial-peers at the caller:








Seeing the two kinds of dial-peers at the answer:









VoIP Topology Example









CISCO Configuration:
!
voice-card 0
no dspfarm
!
voice-card 1
no dspfarm
!
voice class codec 1
codec preference 1 g711ulaw
codec preference 2 g711alaw
codec preference 3 g723r63
codec preference 4 g729r8
codec preference 5 g729br8
!
username ilmcisco privilege 15 secret 5 $1$KLC2$qOj7xltCoZyz8h7D95f1y.
username cisco privilege 7 password 7 104D000A0618
!
!
interface Serial0/0/0
bandwidth 2048
ip address 1.1.1.1 255.255.255.252
encapsulation ppp
h323-gateway voip interface
max-reserved-bandwidth 100
!
voice-port 0/1/0
timeouts interdigit 2
!
voice-port 0/1/1
timeouts interdigit 2
!
!
!
!
dial-peer voice 1 pots
destination-pattern 111
port 0/1/0
!
dial-peer voice 25 voip
destination-pattern 222
modem passthrough nse codec g729r8
session target ipv4:1.1.1.2
dtmf-relay h245-signal h245-alphanumeric
!
scheduler allocate 20000 1000
!
end

MAIPU Configuration:

user admin privilege 15 password 7 [WOWWWNXSX
user monitor privilege 3 password 7 ]Y_Y^YYYTZ_YRZ

aaa new-model
aaa authentication login default local
aaa authorization exec default localenable password P[CFYL[SEbPd encrypt


interface serial0
physical-layer sync
encapsulation ppp
ip address 1.1.1.2 255.255.255.252
exit

dialplan terminator time 2

dial-peer 1 pots
destination-pattern 222
port 1/0
exit

dial-peer 99 voip
destination-pattern 111
session-target 1.1.1.1
exit

voice-port 1/0
codec g729
maxpayloadnum 4
exit