3.1.6 Security

  1. Describe some of the ways in which conventional email is vulnerable to eavesdropping, masquerading, tampering, replay and denial of service.
  2. Suggest methods by which email could be protected against each of these forms of attack.

Ian Wakeman 2005-02-22