An electronic mail system could be used to leak information. First, explain how the leakage could occur. Then, identify controls that could be applied to detect or prevent the leakage.

What will be an ideal response?


The electronic mail system could leak information in the number of messages sent, the kinds of messages, the sizes, the destination addresses, the number of characters in a message, the number of odd-­?length or even-­?length messages, the contents of various header fields, and so forth.

The control most frequently used is human review of the content of the message, followed by manual paraphrasing and rekeying of the message (so that header modifications, message length, message parity, and the like would be distorted). This is obviously a slow and expensive solution.

Another approach is the use of variousguards, which are programs that look for specific patterns in the message. One pattern is the“dirty word search” that scans a message for any of a finite list of unacceptable, sensitive words (for example,bomb, uranium, plutonium, fission). The major limitations of this approach are that the dirty word list is seldom complete (so the sender could get away by substituting “explosive device” for “bomb”), and the sender can always encode the dirty word (for example, representing “bomb” by four consecutive innocuous words, beginning with the letters B-­?O-­?M-­?B).

Computer Science & Information Technology

You might also like to view...

Docking and anchoring are easy ways to:

a) allow a form to change size without altering the form too much. b) prevent users from changing the layout of the window. c) prevent a user from resizing the form. d) All of the above

Computer Science & Information Technology

A _________ block executes regardless of whether an exception occurs.

a. final b. finally c. catch d. none of the above

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. External output differs from internal output in its distribution, design, and appearance. 2. Display screen output has a distinct advantage over printed output because of the quietness and potential for interaction. 3. If many users in the business need different output at different, short periods of time, and they need it quickly, then printed output is the best alternative. 4. Output is best thought of as a neutral product to be subsequently analyzed and acted upon by decision makers.

Computer Science & Information Technology

Which of the following is not one of the four basic operations of any computer?

A) Input B) Output C) Process D) Communicate

Computer Science & Information Technology