Book Excerpt

Avoid phishing with e-mail authentication: Cisco Identified Internet Mail

What you will learn from this excerpt: How Cisco Identified Internet Mail authenticates e-mail and helps organizations avoid phishing.
E-mail Security School
Attend our on-demand E-mail Security School webcasts and learn tactics for securing your e-mail systems while earning CPE credits from (ISC)2.

Designed to help identify fraudulent e-mail, Cisco Identified Internet Mail (IIM) is the proposed Cisco Systems signature-based e-mail authentication standard. Implementing IIM makes the sending domain more accountable for e-mail originating from its domain and limits the ability of spammers and malware distributors to forge return addresses or disguise the identity of infected systems.

To establish the authenticity of an e-mail message, IIM verifies that the message sender is authorized to send messages using a given e-mail address and that the original message was not altered in any consequential manner. IIM adds two headers to the message format: IIM-Signature and IIM-Verification. It also applies user-defined policies depending on the outcome of the message verification process.


  The Sender Policy Framework (SPF)
  Cisco Identified Internet Mail

By Rachael Lininger and Russel Dean Vines
334 pages; $29.99
John Wiley & Sons
Read Chapter 6, Helping your organization avoid phishing

This was first published in May 2005

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: