Page 1591 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1591

protocols. This allows for email to be easily spoofed, spammed,
                    flooded, eavesdropped on, interfered with, and hijacked. Defenses

                    against these issues primarily include having stronger
                    authentication requirements and using encryption to protect the
                    content while in transit.
   1586   1587   1588   1589   1590   1591   1592   1593   1594   1595   1596