Page 877 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 877

email.

               Email is a common delivery mechanism for viruses, worms, Trojan
               horses, documents with destructive macros, and other malicious code.

               The proliferation of support for various scripting languages,
               autodownload capabilities, and autoexecute features has transformed
               hyperlinks within the content of email and attachments into a serious
               threat to every system.

               Email offers little in the way of source verification. Spoofing the source
               address of email is a simple process for even a novice attacker. Email
               headers can be modified at their source or at any point during transit.

               Furthermore, it is also possible to deliver email directly to a user’s
               inbox on an email server by directly connecting to the email server’s
               SMTP port. And speaking of in-transit modification, there are no
               native integrity checks to ensure that a message was not altered
               between its source and destination.

               In addition, email itself can be used as an attack mechanism. When

               sufficient numbers of messages are directed to a single user’s inbox or
               through a specific STMP server, a denial-of-service (DoS) attack can
               result. This attack is often called mail-bombing and is simply a DoS
               performed by inundating a system with messages. The DoS can be the
               result of storage capacity consumption or processing capability
               utilization. Either way, the result is the same: Legitimate messages

               cannot be delivered.

               Like email flooding and malicious code attachments, unwanted email
               can be considered an attack. Sending unwanted, inappropriate, or
               irrelevant messages is called spamming. Spamming is often little more
               than a nuisance, but it does waste system resources both locally and
               over the internet. It is often difficult to stop spam because the source
               of the messages is usually spoofed.



               Email Security Solutions

               Imposing security on email is possible, but the efforts should be in
               tune with the value and confidentiality of the messages being
               exchanged. You can use several protocols, services, and solutions to
               add security to email without requiring a complete overhaul of the
   872   873   874   875   876   877   878   879   880   881   882