Home Page

VPN & Cryptography

Firewalls

Email & Spam

Security Topics

 

Email Spam

Zero Day Window

BATV

Bayesian Algorithm

Content and Connection control

Directory Harvesting Attacks

Email Encryption

Email Archiving

File attachments

Image scanning

Port forwarding and MX records

Reputation filters

Encrypted attachments

Grey Listing

Email Monitoring

Internal Email Security

Open Relay

Per user quarantine area

Reverse DNS lookup & SPF

RFC Compliant emails

SMTP IMAP4 or POP3

Email Throttling

What is Spam

Whitelists and Blacklists

 

 

The importance of Image Scanning - Email Security Guide

 

Images can just as easily break laws, send out abusive immoral messages, offend staff and damage company reputation. Images coming from your company can make you liable to prosecution and attract unwanted media. Some firewall proxy servers support image scanning usually purchased as an additional subscription, which can detect pornography and other unsuitable material.

For example, a feature known as Image Manager by a security vendor known as Clearswift not only scans for images within the body of an email, but also scans for images deep within attached files, completely breaking them down extracting embedded images and passing them on to Image Manager to scan for unwanted images.

When Image Manager is scanning for images, it checks its pre-populated database. It checks the hash of the image and compares this hash with hashes within its database. These hashes within the database are a bulk of known images downloaded from Clearswift servers periodically.

If there is no match within the database then Image Manager scans the image and looks for certain characteristics within the image to classify it appropriately. These features and characteristics are compared to its built in image feature database. This database contains values for thousands of features, and if the feature matches with one in the database or even a close match, then appropriate action is taken depending on the classification of the matched feature within the database.

Further Reading

Wikipedia's guide to Spam Techniques