2022
DOI: 10.35877/454ri.jinav1395
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted Email For Local Government Information Security In South Sumatra

Abstract: This study obtains an overview of the conditions of the encryption email management workflow among local governments in South Sumatra. The workflow for managing email encryption for regular official news has been going very well. Meanwhile, the workflow for managing encryption of emails for confidential news is still experiencing problems, especially for local governments that do not have cipher expert personnel and official cipher equipment from the BSSN. In addition, this study also illustrates that the appl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 15 publications
0
0
0
Order By: Relevance
“…Two stages of SMTP are used, one between the sender and the mail server, and another between the sender s server and the receiver s server. Since SMTP is a push protocol and a pull protocol is required at the receiver s end, either POP3 or IMAP4 can be used between the receiver s mail server and the receiver [10][11][12][13][14][15][16]. When sending messages between a client and a server, SMTP uses commands and responses.…”
Section: Email Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Two stages of SMTP are used, one between the sender and the mail server, and another between the sender s server and the receiver s server. Since SMTP is a push protocol and a pull protocol is required at the receiver s end, either POP3 or IMAP4 can be used between the receiver s mail server and the receiver [10][11][12][13][14][15][16]. When sending messages between a client and a server, SMTP uses commands and responses.…”
Section: Email Systemmentioning
confidence: 99%
“…Phishing attacks are also easy to send because it does not check message integrity. The SMTP protocol does not have a mechanism to prevent repudiation, which would force a sender to deny sending emails [12]. The POP and IMAP protocols are pull-type protocols, which means that a request is sent to the mail server for access to the mailbox using the username and password.…”
Section: Security Issues In Email Protocolsmentioning
confidence: 99%