Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Email Security Issues, Tools, and Techniques Used in Investigation

View through CrossRef
The email system is a globally distributed communication infrastructure service that involves multiple actors playing different roles to ensure end-to-end mail delivery. It is an indispensable method of communicating that is changing how people share data and information. As a result, it facilitates effective and efficient communication, especially in business, as well as convenience, accessibility, and replication. Today, email can send more than just text files; it can also send audio, video, photos, and other files with extensions. With email becoming ubiquitous in all aspects of our lives, enhancing its security, operating procedures, and forensic investigation has become essential. The purpose of this paper is to review some real email forensic incidents and the tools and techniques that have been proposed. A discussion of the major threats to email as well as techniques to mitigate them will also be provided. A comparison study was made of several techniques and analysis tools used in email forensics. In addition, this paper compares the available software tools for email forensics based on factors such as language interface, user interface, programming language, creation of image files, calculation of hash value, cost, and advantages.
Title: Email Security Issues, Tools, and Techniques Used in Investigation
Description:
The email system is a globally distributed communication infrastructure service that involves multiple actors playing different roles to ensure end-to-end mail delivery.
It is an indispensable method of communicating that is changing how people share data and information.
As a result, it facilitates effective and efficient communication, especially in business, as well as convenience, accessibility, and replication.
Today, email can send more than just text files; it can also send audio, video, photos, and other files with extensions.
With email becoming ubiquitous in all aspects of our lives, enhancing its security, operating procedures, and forensic investigation has become essential.
The purpose of this paper is to review some real email forensic incidents and the tools and techniques that have been proposed.
A discussion of the major threats to email as well as techniques to mitigate them will also be provided.
A comparison study was made of several techniques and analysis tools used in email forensics.
In addition, this paper compares the available software tools for email forensics based on factors such as language interface, user interface, programming language, creation of image files, calculation of hash value, cost, and advantages.

Related Results

The determinants of consumer behavior towards email advertisement
The determinants of consumer behavior towards email advertisement
PurposeThe aim of this study was to develop a theoretical model of email advertising effectiveness and to investigate differences between permission‐based email and spamming. By ex...
INTEGRATING QUANTUM KEY DISTRIBUTION INTO EMAIL SYSTEMS FOR NEXT-GENERATION COMMUNICATION SECURITY
INTEGRATING QUANTUM KEY DISTRIBUTION INTO EMAIL SYSTEMS FOR NEXT-GENERATION COMMUNICATION SECURITY
In today’s digital era, where sensitive data is frequently transmitted over email, ensuring secure communication has become a pressing concern. This paper aims to integrate the pri...
Research of Email Classification based on Deep Neural Network
Research of Email Classification based on Deep Neural Network
Abstract The effective distinction between normal email and spam, so as to maximize the possible of filtering spam has become a research hotspot currently. Naive ...
User Motive Factors: The Rudiments to Email Satisfactory Communication
User Motive Factors: The Rudiments to Email Satisfactory Communication
Our study aims to evaluate if user motive factors, comprising; cognitive needs, social integrative needs, and personal integrative needs might influence email satisfactory communic...
Forensic triage of email network narratives through visualisation
Forensic triage of email network narratives through visualisation
Purpose – The purpose of this paper is to propose a novel approach that automates the visualisation of both quantitative data (the network) and qualitative data (th...
Analisa Forensik pada email spoofing
Analisa Forensik pada email spoofing
Menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah(legitimate...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
AI-Driven Marketing: Leveraging Artificial Intelligence for Enhanced Customer Engagement
AI-Driven Marketing: Leveraging Artificial Intelligence for Enhanced Customer Engagement
AI-Driven Marketing: Leveraging Artificial Intelligence for Enhanced Customer Engagement provides an in-depth exploration of how artificial intelligence (AI) is transforming the ma...

Back to Top