There are many risks associated with the use of e-mail. The risks include information leakage, data integrity violations, repudiation, malicious code, SPAM, and others. Following is a brief overview of the major issues.
Information Leakage
Over 11,000 different computer viruses exist to date and some 300 new ones are created each month. Their effects range from negligible, to bothersome, to destructive. The danger of viruses transmitted through macros, another common form of virus transmission, is that they allow the user to continue working and sharing documents. This way, the virus spreads faster, infecting more and more users. One such macro virus, known as Melissa, reared its ugly head on March 26, 1999. Melissa forced organizations the world over - among them Microsoft and Intel - to suspend all e-mail transactions. The spread of this virus resulted in productivity loss. Similar destructive viruses include the Chernobyl and the Explore Worm, both of which wipe out files, resulting in data loss. Most viruses and other malicious code programs are delivered through e-mail messages as attachments. If you receive a harassing or threatening e-mail message from a specific individual, we recommend you take the following steps: Step 1 The sender should be told that you do not want to receive any further communications and you should reply to sender with a message similar to the following: "I do not wish to receive any further communications from you of any sort." You do not need to explain why, just that you want the communications to stop. Keep a copy of the original e-mail you received as well as the response you send. This is required if any further action is taken to track down the sender. If the content or any circumstances surrounding the message cause you to have concerns for your safety, the University of Toronto Police Service should be contacted immediately. Forward a copy of the e-mail message to Computer Security Administration at security.admin@utoronto.ca. They are responsible for keeping track of such incidents as well as for initiating investigation of such incidents. Optionally, if you feel it would be helpful, you may choose to cc or bcc a copy of the message to the University of Toronto Police Service. To reinforce the request for non-communication, you many choose to inform the sender you are contacting these university authorities as follows: "A copy of this e-mail is being forwarded to the University of Toronto Police Service and Computer Security Administration. Further communication of any sort will result in immediate notification to University authorities and the Police" Note: Computer Security Administration can provide assistance in taking the necessary steps to resolve such incidents. It is a good idea to keep copies of all messages sent and received. And remember, you don't want to get into a shouting match or a protracted exchange of messages with the individual who sent you the message. Step 2 If the sender persists on communicating with you please notify Computer Security Administration and the University of Toronto Police Service right away and ask for further assistance.
In order for Security Amdinistration to investigate Spam and other e-mail related incidents, the message forwardedas part of the report must include the full and complete Internet mail headers. Without the headers, we are not able to identify the source of the message or whether the source address/IP number are forged. Following are instruyctins on how to obtain the mail headers for messages handled through Outlook, MS Outlook and Netscape mail. MS Outlook To display the Internet headers:
Outlook Express To display the Internet headers:
Netscape Messenger To display the Internet headers:
|
All contents copyright © University of Toronto 2000-2003 This Site is maintained by the Computer Security Administration Group Comments & Questions |