Key Concepts in Email Security

Feb 6, 2025

Lecture on Email Security: Key Concepts and Terminologies

Importance of Email Security

  • Email is a crucial communication channel in businesses.
  • It's a common target for attacks due to its widespread use.

Types of Email Attacks

Phishing

  • Most common email-based social engineering.
  • Trick recipients into believing the email is from a legitimate source to extract sensitive information.

Subtypes of Phishing

  • Spear Phishing: Targeted at specific individuals.
  • Whaling: Aimed at high-level executives.
  • Pharming: Redirects to fake websites to steal credentials.
  • Email Forwarding: Crafting emails to look like part of a legitimate email chain.

Business Email Compromise (BEC)

  • Involves using compromised email accounts to send legitimate-looking emails.

Analyzing Email Headers

  • Email headers contain metadata useful for identifying spoofed emails.
  • Important fields to analyze:
    • Display From: Sender’s email address and name.
    • Envelope From/Return Path: Sender's return address.
    • Received By/From: Email servers that processed the email.
    • Authentication Results: Sender’s authentication methods.

Tools for Email Analysis

  • Microsoft Office 365 tools, email header analyzers.
  • Check for IP validity, blacklist status.

Email Payload and Risks

  • Attachments may contain executable code or scripts.
  • HTML emails can have embedded scripts.
  • Links can redirect to malicious sites.

Signature Block

  • The absence or inaccuracy of an email signature block can hint at spoofing.

Server-Side Email Security Mechanisms

Sender Policy Framework (SPF)

  • Uses DNS to publish valid email servers of a domain.
  • Helps prevent email spoofing.

DomainKeys Identified Mail (DKIM)

  • Uses cryptography (PKI) to create digital signatures for email authenticity.

Domain-based Message Authentication, Reporting & Conformance (DMARC)

  • Provides policies for using SPF and DKIM.
  • Defines how to handle emails failing authentication checks.

Ensuring Email Confidentiality

S-MIME (Secure/Multipurpose Internet Mail Extensions)

  • Digital certificates for signing and encrypting emails.
  • Ensures confidentiality, integrity, and authenticity of emails.

Logging and Monitoring

  • Inspect email server logs for errors or possible security threats.
  • SMTP protocols use return codes to indicate email transaction status.

Exam Preparation

  • Understand phishing types and email header fields.
  • Understand and apply security controls like SPF, DKIM, DMARC, and S-MIME.

Note: Ensure to revisit these concepts for exam preparation, particularly focusing on phishing subtypes, email header analysis, and security mechanisms like SPF, DKIM, and S-MIME.