E-mail security

Using e-mail across the Internet or other untrusted network imposes security risks against which using a firewall may not protect.

You must understand these risks to ensure that your security policy describes how you will minimize these risks.

E-mail is like other forms of communication. It is very important to use discretion before sending any confidential information through e-mail. Because your e-mail travels through many servers before you receive it, it is possible for someone to intercept and read your e-mail. Consequently, you may want to use security measures to protect the confidentiality of your e-mail.

Common e-mail security risks

These are some risks associated with using e-mail:

E-mail security options

To guard against flooding and spamming risks, you must configure your e-mail server appropriately. Most server applications provide methods for dealing with these types of attacks. Also, you can work with your Internet Service Provider (ISP) to ensure that the ISP provides some additional protection from these attacks.

What additional security measures you need depend on the level of confidentiality that you need, as well as what security features your e-mail applications provide. For example, is keeping the contents of the e-mail message confidential sufficient? Or do you want to keep all information associated with the e-mail, such as the originating and target IP addresses, confidential?

Some applications have integrated security features that may provide the protection you need. Lotus Notes® Domino®, for instance, provides several integrated security features including encryption capability for an entire document or for individual fields in a document.

In order to encrypt mail, Lotus Notes Domino creates a unique public and private key for each user. You use your private key to encrypt the message so that the message is readable to only those users that have your public key. You must send your public key to the intended receivers of your note so that they can use it to decipher your encrypted note. If someone sends you encrypted mail, Lotus Notes® Domino uses the public key of the sender to decipher the note for you.

You can find information about using these Notes® encryption features in the online help files for the program.

For more detailed information about security for Domino on the iSeries™, see these references:

When you want to provide more confidentiality for e-mail or other information that flows between branch offices, remote clients, or business partners, you have a couple options.

If your e-mail server application supports it, you can use Secure Sockets Layer (SSL) to create a secure communications session between the server and e-mail clients. SSL also provides support for optional client-side authentication, when the client application is written to use it. Because the entire session is encrypted, SSL also ensures data integrity while the data is in transit.

Another option available to you is to configure a Virtual private network (VPN) connection. As of V4R4, you can use your iSeries to configure various VPN connections, including between remote clients and your iSeries system. When you use a VPN all traffic that flows between the communicating endpoints is encrypted, ensuring both data confidentiality and data integrity.

Related concepts
Virtual private network (VPN)
FTP security
The layered defense approach to security
Related reference
Security terminology