Messaging System Enquiry
Mobile Messaging
4 July 2008
Presented by:
CF Lai
eMessaging in Small Business Environment
This paper will probe into today’s messaging system in Small business environment and introduce the form of mail clients and discuss the e-mail solution’s risk. A guidance and an appropriated solution for email admin.
Planning the site
Mobile messaging
Today’s mail administrators are facing hugs of communications problem between email systems and mail clients. The reasons for these problems are appeared from various human factors, cultures, technologies and values. Administrators are boundary by the gapes and movement of the messaging system to be a risky system to fulfill the mobile messaging.
SMTP relay with authentication, HTTPS, clients certifications and token security password are prevent mail system used by spammer or unauthorised access. These facilities are to pay up with movement of messaging system. Messaging system development from 1972 from intranet to internet where two standards still common nowadays. “SMTP and POP/POP3”. As the mobile users request the administrator must allow the SMTP relay. That’s why the Forgery email addresses still circulate around the internet world.
A new SMTP with authentication seems to be a solution to prevent the spammers abuse the mail server. However, spammers still active and feel exciting by controlling the Zombie and Botnet. Spammer distribute mail by using valid user name and password easily by Trojans and password hacking programs. The outcomes are the mail server’s IP address will be listed in the”DNS block list”. It will reduce the competitive of a organisation’s.
On the others hands most ISP restricted their client (home users) initiate SMTP service from their desktop. The home users are allowed to use the SMTP server which provided by the ISP only.
Although, SMTP auth. is allowed, the mobile users cannot perfectly use this service at home. Administrators are necessary to explain to them some of the ISP blocking the SMTP port. “I don’t understand” the users may reply. Most administrators in small business environment cannot mark out the IT policy. The policy may subject to the executives favorites. There are only one or two IT forks in a company, however they are facing the same problems same as big companies from the messaging system. Finally, SMTP with auth. is not an appropriated solution to an organisation in today’s Internet environment
The
strongest way is DO NOT allow SMTP relay but it is not realistic way. Forces uses experience and understand
the benefits of HTTPS and Web interface and in combining with graphical code at
each login.
If SMTP
relay must use, define and education the security policy. Send security
awareness reminder in particulars periods.
Keeping the mobile device such as notebook, PDA or smart phone which can
connect to the messaging system patches and viruses definition up-to-day. To
avoid the desktop be a Zombie, don’t allow user install or run unnecessary
programs.
Use one-time password for messaging
system gateway login
Maintenance
the mail server by a set of procedures and the procedures should be review in a
particular period. Review the
system features and prevention system can use for today’s Internet
environment. Carefully use the DNS
block list servers, they might not correct and out of services. Monitoring the DNS block list servers and
other database engines that subscribed.
Verify and
check the new IP address offered by ISP, ensure the assigned IP addresses are
clean and not listed in any DNS block list server.
Regularly,
measure the bandwidth usage for your e-mail server. If the spam email or internet attacks
allocation the system loading over 80% or above, you must report to your ISP to
stop the unnecessary traffic at the ISP’s edge.
Ensure system and spam filter configurations unchanged after patching or
software upgrade. Your server may
missing many important mails if the spam filtering engineer too strong. Try to balance between security and real
business environment.
Technologies
are moving fast, the duration of the messaging system life cycle will depend on
the technology growing. We are look
forward to new technology and new security aspects. The processing of the
system life cycle is required to monitor, review and re-engineering.
A system’s usability
can be measured by Integrity and Availability. Whatever, a international corporation or
a sold trader. They have same
expectation to a messaging system.
On-time, useable in anywhere and assist their business.
Steps for setup
messaging system