Email

Email-Based Protocols: Overview

Email communication is a fundamental part of the internet, allowing users to send and receive messages electronically. Several protocols facilitate email exchange between clients and mail servers. The three primary email-based protocols are SMTP, POP3, and IMAP.


1. Email-Based Protocols and Their Uses

ProtocolPort (Default/Alternative)FunctionWhen It Is UsedWhere It Is Used
SMTP (Simple Mail Transfer Protocol)25 (default), 587 (secure submission), 465 (deprecated, SSL)Used for sending emails from clients to mail servers and between mail serversWhenever an email is sent from a client (Outlook, Thunderbird, Gmail) to a mail server or from one mail server to anotherUsed by email clients, email servers, webmail services, and corporate mail servers
POP3 (Post Office Protocol 3)110 (default), 995 (SSL/TLS)Retrieves emails from a mail server and downloads them to a local client, deleting them from the serverUsed when a user wants to download emails for offline access and doesn’t need to sync emails across multiple devicesUsed in desktop email clients like Outlook, Thunderbird, and mobile apps
IMAP (Internet Message Access Protocol)143 (default), 993 (SSL/TLS)Retrieves and syncs emails across multiple devices while keeping messages stored on the serverUsed when a user wants to access emails from multiple devices (smartphone, tablet, PC) while keeping them on the serverCommon in webmail services (Gmail, Yahoo Mail), business environments, and mobile devices

2. How These Protocols Work:

  • SMTP is used for sending an email. Once a user presses “Send,” the email is transmitted to an SMTP server, which then relays it to the recipient’s mail server.
  • POP3 is used for retrieving emails from a server to a local device, and the emails are usually deleted from the server.
  • IMAP is used for retrieving emails while keeping them synchronized across multiple devices. The emails remain stored on the server.

3. Analogy to Explain Email Protocols:

Think of email like sending and receiving letters through the postal system:

  • SMTP (Outgoing Mailman): Acts like a postal worker who takes your letter from the post office and delivers it to another post office.
  • POP3 (Mail Pickup & Delete): Acts like going to the post office, picking up your mail, and taking it home, where the post office deletes its copy.
  • IMAP (Mail Viewing & Syncing): Acts like reading your mail at the post office while leaving the mail stored there so you can access it from any location.

4. How Email Can Be Compromised

Emails are a common attack vector for cybercriminals. Here are some common threats:

ThreatDescriptionExample/Use Case
PhishingAttackers send fake emails that mimic trusted entities (banks, social media) to steal login credentialsAn email claims to be from PayPal, asking the user to “verify their account” by clicking a malicious link
Spam & MalwareEmails with malicious attachments or links install viruses, trojans, or ransomwareAn email pretends to contain an invoice but instead downloads ransomware
Man-in-the-Middle (MITM) AttackAttackers intercept unencrypted emails during transmission to read or modify contentAn attacker in a public Wi-Fi network intercepts an email and alters a bank transfer request
Email SpoofingCybercriminals forge the sender’s email address to impersonate someone elseAn email appears to be from a CEO, requesting employees to transfer funds to an external account
Business Email Compromise (BEC)Hackers gain access to a company’s email system and send fraudulent emailsA compromised CFO’s email is used to instruct finance teams to transfer money to a fake supplier
Credential Theft (Brute Force & Password Spraying)Attackers guess weak passwords to access email accountsA hacker tries common passwords (e.g., “123456” or “password1”) to break into company emails

5. How to Protect Against Email-Based Threats

User Best Practices:

  • Enable Multi-Factor Authentication (MFA) – Adds an extra layer of security beyond just a password
  • Verify Email Sources – Hover over links to check if they lead to a legitimate site
  • Avoid Clicking Unknown Attachments – Only open files from trusted sources
  • Use Strong Passwords – Create complex passwords and change them regularly
  • Be Cautious of Urgent Requests – Attackers often create a sense of urgency to trick users

Technical Measures:

  • Use Secure Ports & Encryption (TLS/SSL): Always use SMTP over 587, IMAP over 993, and POP3 over 995
  • Implement SPF, DKIM, and DMARC: Email authentication mechanisms that verify the sender’s legitimacy
  • Deploy Email Filtering & Anti-Spam Solutions: Blocks phishing and malicious emails
  • Regular Security Awareness Training: Educate employees about phishing and scam tactics
  • Monitor Email Logs & Anomalies: Detect unusual login attempts or sending patterns

6. Use Cases of Secure Email Communication

  • Corporate Communication – Employees use secure email (with MFA and encryption) to discuss confidential matters
  • E-Commerce Transaction Emails – Online stores send order confirmations with authentication protocols (DKIM & SPF)
  • Government & Healthcare – Sensitive data is protected using end-to-end encryption (HIPAA compliance for healthcare)
  • Personal Email Accounts – Users secure accounts using MFA and phishing detection tools