22

I've been searching for a while, trying to find a good get of information about the inherent risks of transmitting sensitive data via email. I'm really looking for a comprehensive list of all the vulnerabilities from an outside source that we can use as part of our "IT Security 101 for non-IT business leaders" training initiative. (I did search both here and on Google first. On Google, I keep getting lengthy articles, and I found good bits and pieces here as well as in my Google searches, but not a full list like I'm looking for.)

The background is that I have various people in the business side that just don't get it. They insist on using email and refuse to accept the fact that it's just not secure.

In my current dilemma, we're implementing SSRS for reporting, and we are expecting people to view the reports on the SSRS site. The reason is that most of the reports we deal with contain sensitive data of one form or another, and we just don't want these reports sent via email. State regulations where we operate identify PID as a last name, first initial or name, and any other form of identifying information, such as an address, SSN, account #, email, etc. The state laws also stipulate that a breach leaking 500 or more records containing such PID has to be reported to the state.

Many of the reports do contain PID by this definition, and most have well over 500 records. So IMO a single report picked up by a sniffer, or accidentally sent to the wrong person is a reportable breach - not something we want to deal with.

However, we have certain upper level management that seems to think that the rules don't apply to them, mostly because they don't understand how real the risk is. The good news is that we're making headway in changing their minds. The bad news is that their eyes glaze over when we get too technical. Also, they don't want to just take our word for it.

Examples I can think of:

  • Sniffers can be used to read emails as they are moving across the network.
  • Email gets sent through many servers between the sender and the recipient. Any one of those servers could be intercepting and saving that email.

I'm not too concerned about the list being too technical - We can us analogies that the business will understand to explain the technical concepts. I'm more interested in a list that's got all the risks.

David Stratton
  • 2,686
  • 3
  • 23
  • 37
  • 1
    Or maybe it's you who won't get why they cling on to their email. Before you talk them out of using their daily use tool that just happens to work for them, have you sat down with them to ensure you can provide equally good an alternative? And mind you, there's a step from "convenient" to "usable" and then another all the way to "enjoyable" ;) Also, rather than insist that you're right and they're wrong, do you have an informed strategy to bring about change? There might be plenty of better ones than showing people wrong. ;) – Steve Dodier-Lazaro Oct 05 '14 at 23:49
  • We had an organisational psychologist telling us about how to implement change strategies in corporations, recommending http://www.mindtools.com/pages/article/newPPM_82.htm as a starting point. Just keep in mind that you're taking something important away from them for very relative and hard to understand benefits. You must have a strategy to make your alternative seem profitable and to make it fit in practice. – Steve Dodier-Lazaro Oct 05 '14 at 23:53

4 Answers4

16

If you want an analogy, read this.

As for the list of vulnerabilities:

  • Emails can be sniffed in transit, since they are not encrypted (some sites will opportunistically employ encryption for transit, but this is not reliably activated).
  • Emails will be stored on physical disks in the servers which are involved in the operation: the sender's email server, the recipient's email server, and any server "in between". Physical disks can be sniffed when decommissioned or through backup tapes. Bored interns in the facilities managing these servers could simply have a look.
  • It is easy to make emails go to the wrong machine by altering the DNS.
  • There are viruses which routinely inspect emails received by infected machines, in search for passwords, credit card data or other juicy information.

The whole email system just assumes that everybody is honest and nice and trustworthy. It is surprising (but morally encouraging) that it works at all.

Tom Leek
  • 172,594
  • 29
  • 349
  • 481
  • 3
    I'd like to mention the integrity issue, emails can be made to look like they came from virtually anywhere. – Adi Feb 01 '13 at 16:43
  • 1
    One reason that isn't really listed here is the persistence of emails. These days emails get persisted and replicated forever on a whole slew of user devices (tablets, cell phones, laptops) on both ends. – Ashtonian Jun 20 '18 at 21:41
  • 1
    I do not understand why the exact same reasons do not apply to any other technology. Emails may or may not be encrypted depending on how the server is set up, just like it is with web-sites and other services. SMTPS uses TLS. Web-sites may also store data in databases and on disks where it also may be viewed. If you can alter DNS then you can attack a web-site too, redirecting http-requests. And viruses target browsers too just like they target email-clienets. Yet people claim that Web is more secure than EMail. The system assumes that the two mailing servers are doing good job, that's all. – Gherman Jul 18 '22 at 17:54
10

The simple and deepest answer is that SMTP (Simple Mail Tranfer Protocol), which handles the sending of mail from client to mail server and between mail servers (other protocols such as POP3 and IMAP are typically used to retrieve mail nowadays), was originally designed for use in the ARPANET, which operated in a time when anyone who could use it had a security clearance in the first place. As such, SMTP fails at all of the four key aspects of information security, because when it was designed whose concerns were handled by alternate means, and the protocol has never been updated to attempt to do so.

  • Confidentiality: SMTP e-mails, by default, are not encrypted during transport or at any other time. Anyone can read them while they are being transmitted along an unencrypted channel, or while they are stored on either party's mail servers awaiting retrieval.
  • Integrity: SMTP provides no more error checking than the transport layer protocol used to send it. That is woefully inadequate when you want to ensure that nobody has tampered with the message; TCP is designed to help ensure that the network itself didn't cause data corruption or loss; it's trivial to change the contents of TCP packets enroute if you have control of one of the network nodes along which they're sent.
  • Authenticity: SMTP has no means to verify that the listed sender is actually the person who sent it. Someone halfway across the world can create an e-mail with your address in the "From" field and nobody will know the difference.
  • Non-Repudiation: Because you can't verify that the person listed as the sender actually sent it, or that the e-mail itself is the original content sent by that sender, that person can very cogently deny that what you received is what they sent, or that they ever sent you an e-mail in the first place.

The addition of the SSL/TLS security handshake into SMTP, creating SMTPS, provides confidentiality on the first leg of the trip (from your computer to your "home" e-mail server). That's all; you can't enforce confidentiality along any other leg of the trip, and the other three aspects of InfoSec are unaffected.

KeithS
  • 6,768
  • 1
  • 24
  • 40
  • 1
    "Nobody will know the difference" is a bit of a misnomer. While the difference might not be obvious, if there are signs to make someone suspicious of the origin of the email, the trace headers (especially when compared to other emails from the same alleged sender) will provide fairly conclusive evidence to at least whether the same ISP was used to send both emails. (Now, a lot of the time these days, that ISP is actually Gmail, which by itself doesn't tell you much of anything...) – user Dec 15 '14 at 15:30
  • SMTPS is a thing.
  • Does HTTP provide protection from tempering?
  • SPF/DKIM. Basically DNS helps with it.
  • Same applies to HTTP-requests, right?
  • I don't understand how Email is less secure than the web-sites given that it seems that all those reasons apply to web too, and in fact it applies to almost all networking techs. It's just as secure as the servers doing the jobs, just like with web-sites. Except it relies on two servers instead of one.

    – Gherman Jul 18 '22 at 18:02