standinglynx

Email Security - CompTIA Security +

Hola!

You may think is there no more chit-chat on this blog anymore? I know i know, but as a part of my personal wiki I find beneficial do a step back and continue with more tables... ey but they are good, as always the resources are validated and double check just in case. Resources from CompTIA Security + Study Notes and Ian Neil Manual.

Let's make this fun and discuss this post: Bluesky

1.Common Email Threats

Threat Description Characteristics / Examples
Phishing Deceptive emails that manipulate users to open messages or click malicious links. Pretend to be legitimate correspondence
Spear Phishing Targeted phishing attack aimed at specific groups with personalized emails creating urgency. Targets board members, key employees
Whaling Email attack targeting CEOs or high-level executives. Highly focused and personalized
Smishing Phishing extended to text messages with malicious links. Also includes Vishing (voice phishing via calls)
Business Email Compromise (BEC) Sophisticated attack using legitimate internal accounts to induce malicious actions. Unauthorized transfers, sensitive info theft
Fraud and Scams Deceptive practices to trick people into giving money or valuable info. DMARC helps protect against these
Identity Spoofing Forging the sender’s address. Prevented by SPF, DKIM, and DMARC
Brand Impersonation Malicious actors impersonate well-known brands via email. Banks and major brands are common targets
Typosquatting Registering domains similar to popular ones with common typos to deceive users. Used in phishing via fake sites
Spam Unwanted and unsolicited emails. Filtered to reduce nuisance
Malware / Virus Email as a vector for delivering malware, often via attachments. Significant threat
Data Exfiltration Unauthorized transfer of sensitive data via email. Can cause serious organizational damage

2. Authentication and Integrity Protocols and Techniques

Protocol / Technique Function Main Benefits Additional Notes
DKIM Digital signature in email headers to verify source and integrity. Authentication, spoofing protection, reputation boost Validation with public key in DNS
SPF Verifies sender IP against authorized IPs in DNS to prevent forgery. Prevents spoofing and phishing, improves deliverability Requires TXT record in DNS
DMARC Sets policies for handling email failures, working with DKIM and SPF. Protects against BEC, phishing, scams; provides reports Allows actions on failed emails

3. Encryption and Confidentiality Techniques and Protocols

Technique / Protocol Description Primary Use Considerations
TLS Transport encryption method to secure data in transit. Used in SMTPS, IMAPS, POP3S Current industry standard
SSL Older version of TLS for securing communications. Network security Deprecated, replaced by TLS
S/MIME Uses PKI digital certificates to encrypt or sign emails digitally. Ensures confidentiality and integrity Complex to implement
PGP End-to-end encryption using public/private key pairs without PKI infrastructure. Content protection only for intended recipient No PKI required

4. Secure Email Protocols

Protocol Description Primary Use
SMTPS SMTP with TLS encryption for secure sending and receiving of emails. Secure server-to-server communication
IMAPS IMAP over TLS for secure access to email mailboxes. Secure client email access
POP3S POP3 over TLS for secure (legacy) client email access. Secure client email access (legacy)

5. Email Security Devices and Solutions

Solution Function Benefits Additional Details
Email Gateways Entry/exit points for emails; routing, security, policy enforcement, encryption. Defense against spam, malware, phishing; DLP integration On-Premises, Cloud, Hybrid options
Spam Filters Detect and block unwanted emails. Reduces nuisance and risks Techniques: content analysis, Bayesian, DNS blacklists
Data Loss Prevention (DLP) Monitors data in transit to prevent theft or unauthorized data leakage. Prevents sensitive data leaks Pattern matching, blocks or alerts
Host/Endpoint Security Protect devices accessing email with antivirus, EDR, MFA, and access control. Protects accounts and prevents infections Essential for comprehensive security

6. Complementary and Organisational Measures

Measure Description Purpose / Benefit
User Awareness & Training Training employees to recognize phishing, safe practices, and report suspicious activity. Reduces human error risk and successful attacks
Monitoring & Logging System and network activity supervision and log analysis for anomalies and incident response. Early threat detection and forensic analysis
Network Security Firewalls, IDS/IPS, network segmentation, and Zero Trust applied to email systems. Infrastructure protection and access control

Assisted by AI