SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsSPAM and Phishing emails commonly spoof the sender domain, both as a way to evade spam filters and to engender the recipient's trust. Several email authentication methods allow organizations to prove emails purporting to originate from their domain actually did so. One such authentication framework, Domain Keys Identified Mail (DKIM), provides a relatively easy way for organizations to use cryptographic signatures to protect their e-mail reputations with only small changes to their existing email and Domain Name System infrastructures. However, in order to use DKIM successfully and effectively, organizations must fully understand its purpose, function and limitations and then take steps to manage and protect the encryption keys.