Enterprise Level E-mail Security System
Abhijit D. Jadhav1, Ashvini A. Phalke2, Pradnya A. Waman3, Usha N. Katore4, Santosh R. Salunkhe5
1Abhijit D. Jadhav, Department of Computer Engineering Sharadchandra Pawar College of engineering, Otur Maharashtra, India.
2Ashvini A. Phalke, Department of Computer Enginnering Pawar College of engineering, Otur, Maharashtra, India.
3Pradnya A. Waman, Department of Computer Enginnering Pawar College of engineering, Otur, Maharashtra, India.
4Usha N. Katore, Department of Computer Engineering Sharadchandra Sharadchandra Pawar College of engineering, Otur, Maharashtra, India.
5Santosh R. Salunkhe, Department of Computer Engineering Sharadchandra Sharadchandra Pawar College of engineering, Otur, Maharashtra, India.
Manuscript received on February 27, 2014. | Revised Manuscript Received on March 18, 2014. | Manuscript published on March 20, 2014. | PP: 1-2 | Volume-2, Issue-4, March 2014. | Retrieval Number: D0413032414/2014©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Data leakage is a process in which a data distributor has given important data to a supposedly trusted agents and some of the data is leaked and found in an unauthorized place or unauthorized user. An enterprise data leak is a scary statement. Security practitioners have always had to deal with data leakage issues that spring up from various ways like email, IM and other Internet channels. One or more agents can leak the data. Moreover, data can also be leaked from within an organization via e-mails. So, there is need to filter these e-mails. The mail can be filtered by blocking e-mails which contains images, videos or sensitive data of an enterprise. The e-mail is one of the sources of data leakage. Principle used in e-mail security is we classify email, sensitive data into the white and black lists with document’s digital signature value. The data can also be changed by the trusted agents. The system will detect such a changes of the sensitive data and if founds same as black list it will block the mail or stop for review. Then the distributor will decide to allow or disallow the incoming mails from the agent’s. The system will prevent the enterprise data from data leakage. E-mail security system will make the data more secure.
Keywords: Black List, SHA, TF, White List.