TAILIEUCHUNG - Review of e-mail system, security protocols and email forensics

This paper review working and architecture of current email system and the security protocols followed generally to secure our email communications and the limitations they contained, further email forensics which is a process to analyze email contents, header information, transit path for email, sender or receiver information and other details to collect evidence against culprit or to make our system more secure is discussed. It also discusses common email forensic investigation technique and tools used in email forensic process. | ISSN:2249-5789 Dilpreet Singh Bajwa et al , International Journal of Computer Science & Communication Networks,Vol 5(3),201-211 Review of E-mail System, Security Protocols and Email Forensics Gurpal Singh Chhabra Asst. Professor, Thapar University, Punjab (India) Abstract: E-mail is the most common mode of communication today. E-mail not only used for sending messages/text only but also to send audio, video and other files as attachment. It is main resource for business communication. As it is most popular and common mode of communication on internet, it also attracts criminals or persons having mischievous intent. Cyber criminals misuse it for sending spam, threats, Phishing-emails, propagating malicious software like virus and worms, distributing illegitimate material like child pornography, hoaxes and also used for other criminal activities. So it is necessary to secure our e-mail system and also to identify criminal, collect evidence against them and punish them under court of law. This paper review working and architecture of current email system and the security protocols followed generally to secure our email communications and the limitations they contained, further email forensics which is a process to analyze email contents, header information, transit path for email, sender or receiver information and other details to collect evidence against culprit or to make our system more secure is discussed. It also discusses common email forensic investigation technique and tools used in email forensic process. Keywords: E-mail, E-mail Architecture, E-Mail Security Protocol, E-mail Forensics, E-mail Investigation, E-mail Forensics Tools. Introduction: E-mail is popular internet application. Millions of user daily uses e-mail for personal, business or for official purpose. As e-mail system influence our life so much today in a positive way, on the other way cyber criminals are also using e-mail as tool to fulfill their malafide intentions.

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.