Page 937 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 937

Internet-based email is insecure unless you take steps to secure it. To
               secure email, you should provide for nonrepudiation, restrict access to

               authorized users, make sure integrity is maintained, authenticate the
               message source, verify delivery, and even classify sensitive content.
               These issues must be addressed in a security policy before they can be
               implemented in a solution. They often take the form of acceptable use
               policies, access controls, privacy declarations, email management
               procedures, and backup and retention policies.


               Email is a common delivery mechanism for malicious code. Filtering
               attachments, using antivirus software, and educating users are
               effective countermeasures against that kind of attack. Email
               spamming or flooding is a form of denial of service that can be
               deterred through filters and IDSs. Email security can be improved
               using S/MIME, MOSS, PEM, and PGP.

               Fax and voice security can be improved by using encryption to protect

               the transmission of documents and prevent eavesdropping. Training
               users effectively is a useful countermeasure against social engineering
               attacks.

               A security boundary can be the division between one secured area and
               another secured area, or it can be the division between a secured area
               and an unsecured area. Both must be addressed in a security policy.

               Communication systems are vulnerable to many attacks, including
               distributed denial of service (DDoS), eavesdropping, impersonation,

               replay, modification, spoofing, and ARP and DNS attacks. Fortunately,
               effective countermeasures exist for each of these. PBX fraud and abuse
               and phone phreaking are problems that must also be addressed.
   932   933   934   935   936   937   938   939   940   941   942