• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Critique: Why Don't we encrypt email?

Extracts from this document...


Shonak Nathwani CS133 Professional Skills Term 2


The article “Why Don’t We Encrypt Our Email” was written by Stephen Farrell in January 2009. It was published the same month in the journal, “Practical Security” by the IEEE Educational Activities Department. The purpose of the article is to briefly inform readers about the different functionality in common Multi User Agents and the security related issues that are frequently ignored by users when using them. This critique will address the appropriateness of ideas and structure in the article.

Farrell’s article assumes fairly strong technical competence of the reader in the field of computer security from the beginning of the article. This is showed through the immediate use of terms such as “Mail User Agents” and “Web-based mail client” (Farrell 2009, p.82).

 In assessing the structure of the article, it is instantly surprising upon first look of the article, how seemingly long-winded it is to answer a relatively simple question. And for the most part, it is.

...read more.


Going back to the structure, as well as removing sections of the article that are irrelevant to the topic being discussed, Farrell could also have included a very concise glossary of the technical acronyms. Many of the technologies mentioned are abbreviated (e.g. MUA, MTA, PEM, MIME etc.), and even for a computer science professional new to this particular topic, it could be tiresome to traverse through the entire text to remind themselves of a definition -  so a glossary would have been useful. Additionally, important quotes aren’t highlighted frequently enough (only once, on page 3) and several images could have been included to show the different MUAs, for example.         In adding these extra components, the article would have been more readable and easier to understand.

Farrell’s language and writing style certainly deserves to be praised. He uses useful analogies to describe his point, such as when he says that mail encryption is “the difference between a postcard (most email) and a closed letter (encrypted mail)” (Farrell 2009, p.82).

...read more.


In summary, the article would successfully inform a computer security-enthusiast about the reasons for not sending encrypted email, and for the most part, information that Farrell has cited from other authors is up to date and based upon concrete computing theory. He explains many of the concepts of encryption with great detail, and uses numerous examples and analogies to put his point across. However, the article may be misleading to the casual reader in the sense that he article is too technically focused and its title does not reflect this. A more suitable title would be “Email: Why Our Software doesn’t Encrypt Our Messages”.  And regardless of the target audience, the structure should have been more fragmented in order to captivate the readers with different styles of engagement. This is especially important as already it doesn’t appear that this article reaches out particularly well to those who are less technically competent, due to the amount of technical jargon. In general, though, the article was an interesting read and offers a solid contribution to the field of computational research.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    { temporary_str_x = (divisor_x[n] * q) + value1[n]; template_x_coordinate[q] = temporary_str_x; } for ( q = 0; q < temp_size_y; q++) { temporary_str_y = (divisor_y[n] * q)+ new_row_no1[kk]; template_y_coordinate[q] = temporary_str_y; } for ( y=0; y < temp_size_y; y++) // image_column flaw---- { for ( x = 0; x < temp_size_x; x++)

  2. Ethics and professionalism in computing - examples from Facebook and Google

    But the proposal to tie real-world identities to online actions is a controversial one, with many privacy and free speech advocates countering that anonymity is necessary to protect dissidents and other individuals, such as sexual abuse victims. According to ReadWriteWeb, Schmidt said of anti-social behavior, "The only way to manage this is true transparency and no anonymity.

  1. An Introduction to the IEEE 802.11p WAVE standard

    The MAC layer is vital in the battle for effective congestion control, and it will be through the MAC layer that occupancy time shall be measured. If congestion is detected, it will be MAC layer that rejects transmission, and so is crucial to the operation of vehicular communications.

  2. Implementation of Path Finding Techniques in Homeland Security Robots

    A collection of active sensor networks can follow the movement of a source to be tracked, for example, a moving vehicle. It can guide the movement of an object on the ground, for example, a surveillance robot. Or it can focus attention over a specific area, for example, a fire in order to localize its source and track its spread.

  1. So in order to understand what the main areas where organisation should be aware ...

    is received. If an ICMP ECHO reply is received, it means that the target is alive. Querying multiple hosts: Querying multiple hosts using this method is referred to as Ping Sweep. Ping Sweeps is the most basic step in mapping out a network.

  2. Avon, which began its operations in 1886, is a global manufacturer and marketer of ...

    Customer's information would be vital in helping Avon with product development. By knowing its customers well, it will help the representatives to understand their customers' needs. This can build the customers' confidence to the company. The outdated information technology of the company has caused lots of problems to the company.

  1. Internet &amp;amp; Intranet Security

    The chain of certificate issued by root certificate authority should be self-signed first in the top position of the trust relations list. Other certificate at the lower trusted subordinate were followed the upper. An ordered list of certificates were formed, starting with a trusted root CA, intermediate CA (might /might not exist)

  2. Distributed Computing

    Checkpointing systems for sequential (Tannenbaum and Litzkow). and parallel applications (Dikken et al.) have been built. Checkpointing systems are of different types depending on the transparency to the user and the portability of the checkpoints. Transparent and semi-transparent checkpointing systems (Tannenbaum and Litzkow)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work