46
Communication in Cyberspace E-mail Apple Mail Writing/sending emails Information Literacy I – EN(IL1) Course

Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Communication in CyberspaceE-mail

Apple Mail

Writing/sending emails

Information Literacy I – EN(IL1) Course

Page 2: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

E-mail SystemMessage delivery

A letter arrived from White Goat

Black Goat gobbled it up unread

Nothing for it but to write a letter right back

I'm sorry, what was it thatyour letter said?

The above translation is taken from the blog of by Matt Treyvaudhttp://no-sword.jp/blog/2009/10/goat_mail.html

“Goat Mail” (Yagi-san yuubin) is a very popular Japanese children’s song

Page 3: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Electronic mail (E-mail)

A method of exchanging digital messages using digital devices.

Store-and-forward system.

Mainly used for communications via computer networks.

Historically, one of the services available via the Internet.

Page 4: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Exchanging Mails

The following 4 main steps can be identified:

1. Writing and editing

2. Sending

3. Transmission

4. Reception

Page 5: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Sending, Transmitting, Receiving

Writinga message

To: Mr.

Black Goat

From: Mr.

White Goat

Sending server

Server to process the

message

Receiving server

Receivingthe message

Relayingserver

Relayingserver

Relayingserver

Page 6: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Example of Sending Failure:Incorrect Configuration of the Sending Server

Writinga message

To: Mr.

Black Goat

From: Mr.

White Goat

Sending server

Server to process the

message

Receiving server

Receivingthe message

Relayingserver

Relayingserver

Relayingserver

Page 7: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Writinga message

I do not know this sending server!

Receiving server

Receivingthe message

Relayingserver

Relayingserver

Relayingserver

To: Mr.

Black Goat

From: Mr.

White Goat

Example of Sending Failure:Incorrect Configuration of the Sending Server

Page 8: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Writinga message

To: Mr.

Black Goat

From: Mr.

White Goat

Sending server

Receiving server

Receivingthe message

Relayingserver

Relayingserver

Relayingserver

The sender is suspicious!I will deny to transmit, because

(s)he did not pass authentication.

Example of Transmission Failure:Incorrect Configuration of Authentication

Page 9: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Writinga message

To: Mr.

Red Goat

From: Mr.

White Goat

Sending server

Receiving server

Receivingthe message

Relayingserver

Relayingserver

Relayingserver

What? There is no Red Goat at this

address!

Example of Transmission Failure:Incorrect Address

Page 10: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Writinga message

Sending server

Receiving server

Receivingthe message

Relayingserver

Relayingserver

Relayingserver

I do not know this receiving server!

To: Mr.

Black Goat

From: Mr.

White Goat

Example of Transmission Failure:Incorrect Configuration of the Receiving Server

Page 11: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Writinga message

Sending server

Receiving server

Receivingthe message

Relayingserver

Relayingserver

Relayingserver

This receiver is suspicious!I will deny to transmit, because

(s)he did not pass authentication.

To: Mr.

Black Goat

From: Mr.

White Goat

Example of Reception Failure:Incorrect Configuration of the Receiving Server

Page 12: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

It is rare, but system failures occur as well

Writinga message

Sending server

Receiving server

Relayingserver

Receivingthe message

Relayingserver

Relayingserver

To: Mr.

Black Goat

From: Mr.

White Goat

Dear customers, we are sorry to inform you that today, due to

maintenance/malfunction/overloadthe mailing system is out of order.

Page 13: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Configuring an e-mailsoftwareMozilla Thunderbird

Thunderbird is a free e-mail software, which is available for Mac, Windows, and Linux

Apple Mail

Available on MacOS and iOS(available in English here in TokyoTech)

Page 14: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Configuring an e-mail software

Detailed information/tutorial available from Tokyo Tech Portal:choose “Online guides” → “Setting up e-mail applications”

Instructions available for Thunderbird, Outlook, and Mail.

Page 15: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

IMAP (vs POP3)

E-mail protocol IMAPSynchronization with e-mail server (also for folders, tags, etc.)

Convenient for high-speed networks, for use with smartphones

Another e-mail protocol POP3 is outdatedDo not use it!

Messages are download to your computer/phone and removed from the server,Thus the messages are not available anymore from webmail or another device.➔ It was (maybe) good when using a single device, but not convenient anymore!

Page 16: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Get your Tokyo Tech mail auth ID

Specific to TokyoTech.You do not need such ID for your private email accounts (gmail, yahoo, …)

Page 17: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

ConfiguringApple Mail software

Select “Other Mail Account”

Note: You can also use for your private email and then choose Google/Yahoo/…

Page 18: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

ConfiguringApple Mail software

Name: Choose a meaningful name! (not a funny nickname)

E-mail address: Input your TokyoTech address(In the form: ****.*.**@m.titech.ac.jp)

Note: When clicking “Sign In”, there will be a warning/error. It is normal. Apple Mail does not know details about Tokyo Tech servers.

Page 19: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

ConfiguringApple Mail software

User Name: TokyoTech mail auth ID

Note: Usually username and email address is the same. But not in TokyoTech.

Note: In Thunderbird, it is necessary to provide more information: port numbers

Page 20: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Configuring Apple Mail softwarelist of messages content of message

• From: sender• To: receiver• Cc: “copy-receiver”...

foldersto order

messages

Page 21: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

ConfiguringApple Mail software

Possible to configure many options

You can check more by yourself

Page 22: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Advantages of Apple Mail (or Thunderbird)

It is fast

No need to login to Tokyo Tech portal

Check how fast the Inbox opens – vs Tokyo Tech Webmail

Multiple accounts can be handled (working, home, etc.)

Advanced folder handling

Advanced customization,including themes (skins)

Page 23: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

ConfiguringThunderbird software

Only for information, not used today

Roughly same information needed, but:-explicit port numbers-explicit protocols

Page 24: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

ComposingMessages

Page 25: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Three types of destination addresses

The message will be sent to the address(es) written in the following fields:

To – Main destination

CC – Carbon Copy

BCC – Blinded Carbon Copy

Page 26: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Basics etiquette for e-mail communication

Typically, one receives a few dozens e-mails a day.

E-mail messages are typically “long” (a few paragraphs).

Use your Tokyo Tech e-mail account (also from your smartphone) when communicated to the faculty members.

Remember to configure your account to show your real name.

Page 27: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Basics etiquette for e-mail communication (cont)

When composing your message, add the subject that summarizes the contents and/or the topic of your letter.

Always begin your message with the name of the person, whom you are referring to.

When writing for the first time, state your name, the student number, the class, followed by the contents of your inquiry.

Page 28: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Example of good and not-so-good emails

Still much better than last year ☺

Thank you for your messages!

Page 29: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Purpose of Tokyo Tech e-mailThe main purpose of your Tokyo Tech e-mail account is to support your communications on the topics related to your studies.

In particular, it will be used by Tokyo Tech for:

Notifications of cancelling classes (for instance, in the case of influenza outbreak)

Providing supplementary materials for classes

Announcements from Student Support Division

Etc.

➔ Check regularly, once per day

Page 30: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Methods for protecting e-mail systems

IMAP + SSL/TLS

POP3 + SSL/TLS

SMTP + SSL/TLS

IMAP (and POP3) are the protocolsfor incoming e-mail

SMTP is the protocol for outgoing e-mail

But what is SSL/TLS?

Page 31: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Potential risks in Internet communications

Authentication failure: A fake mail-server may try to pose as the Tokyo Tech mail-server to steal users’ messages.

Information leakage: The communication over the network is intercepted, causing the leakage of username and password, so that the account may be hijacked.

Tampering: The messages sent and received by the user may be changed in the process of transmission, and also fake messages can be inserted.

Page 32: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Measures used in SSL/TLSto protect e-mail systems

Authentication: Identity of the e-mail server is certified and confirmed.

Encryption: Communication with the server is encrypted.

Tamper resistance: Keyed cryptographic hash functions are used as checksums.

Page 33: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

SSL/TLS is the fundamental technologyfor protection of the Internet communication

Secure communication between web browsers and web servers

Authentication (certificate verification)

Confidentiality (encryption)

Integrity (tampering detection)

Page 34: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Security risks concerning e-mail systems

Do not trust the message header

Attached files: Careful! They are potentially dangerous!

Visiting malicious websites: Careful! Do not click just any link, as it may be dangerous! (Your PC may get infected by malware just by visiting a malicious website.)

Automatic opening of multimedia data (photos, videos, etc.) is potentially dangerous!

Page 35: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Identifying phishing

These are two recently received messages

Page 36: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Suspicious or not?

This cannot be right!

Page 37: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Suspicious or not?

I have never heardof this service

Page 38: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Suspicious or not?

If a valid digital signatureis included, we can trustthe message, right?

Page 39: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Suspicious or not?

This is too informalfor the bank!

Page 40: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Suspicious or not?

These expressionslook strange

Page 41: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Suspicious or not?

Why are they first talkingabout authorization, but then suggest me

to register?

Page 42: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

The evolution of phishing

Page 43: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Phishing poses a real threat!

At the first glance, this message is from Resona Holdings, but if you just check, the link is pointing to a mysterious address www.v-i-p8.com(a closer look shows that this is a company located outside Japan)

Page 44: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Summary of key points

E-mail system – computer analogue of postal mail.

Handled using e-mail software, some of which is free.(Thunderbird as an example.)

Software must be (downloaded, installed), and configured prior to use.

IMAP is the recommended e-mail protocol.

Page 45: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

Summary of key points (cont.)

Various options can be used when composing and sending messages.In particular, copies of the same message can be sent to several addresses at once (To:, Cc:, Bcc:).

Basic etiquette must be followed when writing e-mails.

Security settings guarantee protection against unauthorized access to your private information (SSL/TLS).On top of this, measures must be taken to prevent phishing and other illegal activities.

Page 46: Information Literacy I EN(IL1) Course · A method of exchanging digital messages using digital devices. ... Authentication (certificate verification) Confidentiality (encryption)

1st Test – E-mailYour answers should be submitted via the Google Form:https://forms.gle/RcqaTyViQ69oxR5h9 (link on the course website).

To be completed by April 30 23:59.

You are allowed to submit your answers multiple time, the last submission before the deadline will be considered final.

This test is mandatory – it is a part of your course evaluation.

NB: Depending on the settings of your browser, some text in the above form may appear in Japanese. In any case, write your answers in English.

Next Lecture is on May 9 (THURSDAY)