Monday, February 3, 2020
E-mail protocol Research Paper Example | Topics and Well Written Essays - 2500 words
E-mail protocol - Research Paper Example Anonymity of all the parties together with message security and integrity can be ensured by use of digital signature protocols that make it possible for delivery of electronic mail to be certified. i. Several reasons make it necessary to certify delivery of electronic mail. These include: a. To eliminate the danger of hacking, reverse engineering and eavesdropping. b. To ensure that the parties to an electronic message remain anonymous to each other for security reasons. c. To make it possible to safely transfer information from one party to another or from one sender to multiple recipients while at the same time addressing the issue of repudiation. ii. Certifying delivery of electronic mail has several advantages over conventional mail because: a. It improves efficiency of mail delivery while at the same time taking care of security concerns. b. Either of the parties to the message is barred by the protocol from ever denying having received or sent the message. iii. The protocol ens ures that only the intended message is sent. E-mail Protocol Abstract The issue of security can never be overlooked in this digital age when it comes to corporate emails. A simple leakage of confidential information can create a huge social, economical and political scene that can be costly in terms of money. Therefore, the need to add value to delivery of important data over the internet to safeguard individual and corporate interests cannot be overemphasized. To guarantee delivery of email messages, it would be paramount to consider using certified mail and lay down stringent rules to govern employee conduct towards the use of conventional email. However, there are controversies that surround the use of certified mail in that it deals only with a single sender and a single recipient. So, what happens when there is the need to send an email message to more than one recipient? The answer lies in the use of a multi party certified e-mail protocol with multiple recipient capabilities. It enables the sender to realize his intention of sending similar message to multiple recipients. Any recipient who acknowledges receipt of the senderââ¬â¢s message is guaranteed to have received the email. To appreciate the role of email protocols best, it would suffice to not only consider how security loopholes can be sealed in the current internet infrastructure but also look at possible ways of curtailing weaknesses and optimizing on strengths of email protocol. Introduction Without email protocols, it would not be possible to maintain a consistent and orderly system for transporting, routing, handling, retrieval and storage of email messages. Email protocols provide the rules for governing such activities. There are several protocols that enable a mail server and a mail client to exchange information but this will be dealt with later on in this document. Though these protocols differ in some ways, yet they all follow similar pattern. First, one computer will normally start a conversation with another. Second, as the conversation is taking place, the server acknowledges the command using a certain code. The code informs about the success of the command or if an error occurred and finally the conversation is ended. The email protocol helps eliminate communication barriers in email systems thereby making it unnecessary to rely on proprietary protocols. This has the overall effects of making communication to be efficient by eliminating the need of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.