• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Critique: Why Don't we encrypt email?

Extracts from this document...

Introduction

Shonak Nathwani CS133 Professional Skills Term 2

 Critique

The article “Why Don’t We Encrypt Our Email” was written by Stephen Farrell in January 2009. It was published the same month in the journal, “Practical Security” by the IEEE Educational Activities Department. The purpose of the article is to briefly inform readers about the different functionality in common Multi User Agents and the security related issues that are frequently ignored by users when using them. This critique will address the appropriateness of ideas and structure in the article.

Farrell’s article assumes fairly strong technical competence of the reader in the field of computer security from the beginning of the article. This is showed through the immediate use of terms such as “Mail User Agents” and “Web-based mail client” (Farrell 2009, p.82).

 In assessing the structure of the article, it is instantly surprising upon first look of the article, how seemingly long-winded it is to answer a relatively simple question. And for the most part, it is.

...read more.

Middle

Going back to the structure, as well as removing sections of the article that are irrelevant to the topic being discussed, Farrell could also have included a very concise glossary of the technical acronyms. Many of the technologies mentioned are abbreviated (e.g. MUA, MTA, PEM, MIME etc.), and even for a computer science professional new to this particular topic, it could be tiresome to traverse through the entire text to remind themselves of a definition -  so a glossary would have been useful. Additionally, important quotes aren’t highlighted frequently enough (only once, on page 3) and several images could have been included to show the different MUAs, for example.         In adding these extra components, the article would have been more readable and easier to understand.

Farrell’s language and writing style certainly deserves to be praised. He uses useful analogies to describe his point, such as when he says that mail encryption is “the difference between a postcard (most email) and a closed letter (encrypted mail)” (Farrell 2009, p.82).

...read more.

Conclusion

In summary, the article would successfully inform a computer security-enthusiast about the reasons for not sending encrypted email, and for the most part, information that Farrell has cited from other authors is up to date and based upon concrete computing theory. He explains many of the concepts of encryption with great detail, and uses numerous examples and analogies to put his point across. However, the article may be misleading to the casual reader in the sense that he article is too technically focused and its title does not reflect this. A more suitable title would be “Email: Why Our Software doesn’t Encrypt Our Messages”.  And regardless of the target audience, the structure should have been more fragmented in order to captivate the readers with different styles of engagement. This is especially important as already it doesn’t appear that this article reaches out particularly well to those who are less technically competent, due to the amount of technical jargon. In general, though, the article was an interesting read and offers a solid contribution to the field of computational research.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Implementation of Path Finding Techniques in Homeland Security Robots

    Figure 3.3: Final modified design of the vehicle and obstacle 3.8 Patch Class In accordance with the cell decomposition method the world was decomposed by equal sized patch grids. The size of the patch grids and the vehicle were made the same in order to ease the navigation of the vehicle from one patch grid to another.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    { max_difference = row_difference[x]; } else{} } for (int x = 0; x < total_row ; x++) { if ((max_difference - row_difference[x]) < 10) { new_row_no1[new_total_row] = row_no1[x]; new_row_no2[new_total_row] = row_no2[x]; new_total_row = new_total_row + 1 ; } else {} } //------------------------------------------------------------------------------------------------------- // till here plate processed, divided horizontally and

  1. Ethics and professionalism in computing - examples from Facebook and Google

    A policy that has been difficult at times to enforce, as the prevalence of spam accounts or profiles assigned to people's pets suggest. Randi Zuckerberg, Facebook's marketing director, has a fix for cyberbullying: stop people from doing anything online without their names attached.

  2. An Introduction to the IEEE 802.11p WAVE standard

    will be deployed. EDCA was instigated with the 802.11e amendment that sought to modify the MAC layer with a set of enhancements for use in wireless environments. EDCA works by assigning traffic periods of time called transmit opportunities, with stations holding higher priority data given longer intervals.

  1. So in order to understand what the main areas where organisation should be aware ...

    TCP Sweeps: The TCP connection establishment process is called "the three way handshake", and is combined of three segments. I. A client sends a SYN segment specifying the port number of a server that the client wants to connect to, and the client initial sequence number.

  2. Avon, which began its operations in 1886, is a global manufacturer and marketer of ...

    Their representatives are better equipped. Another issue will be to boost the sales of the company through the well-managed files of the customers of the company so that the representatives may have the access to it at any time as they wish.

  1. Distributed Computing

    Checkpointing systems for sequential (Tannenbaum and Litzkow). and parallel applications (Dikken et al.) have been built. Checkpointing systems are of different types depending on the transparency to the user and the portability of the checkpoints. Transparent and semi-transparent checkpointing systems (Tannenbaum and Litzkow)

  2. Internet &amp;amp; Intranet Security

    The chain of certificate issued by root certificate authority should be self-signed first in the top position of the trust relations list. Other certificate at the lower trusted subordinate were followed the upper. An ordered list of certificates were formed, starting with a trusted root CA, intermediate CA (might /might not exist)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work