Email Security Issues, Tools, and Techniques Used in Investigation

被引:2
|
作者
Altulaihan, Esra [1 ]
Alismail, Abrar [1 ]
Rahman, M. M. Hafizur [1 ]
Ibrahim, Adamu A. [2 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun, Al Hasa 31982, Saudi Arabia
[2] Int Islamic Univ Malaysia IIUM, Dept Comp Sci, KICT, Kuala Lumpur 53100, Malaysia
关键词
email; security; email forensics; threats; investigation; email analysis; tools; techniques;
D O I
10.3390/su151310612
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The email system is a globally distributed communication infrastructure service that involves multiple actors playing different roles to ensure end-to-end mail delivery. It is an indispensable method of communicating that is changing how people share data and information. As a result, it facilitates effective and efficient communication, especially in business, as well as convenience, accessibility, and replication. Today, email can send more than just text files; it can also send audio, video, photos, and other files with extensions. With email becoming ubiquitous in all aspects of our lives, enhancing its security, operating procedures, and forensic investigation has become essential. The purpose of this paper is to review some real email forensic incidents and the tools and techniques that have been proposed. A discussion of the major threats to email as well as techniques to mitigate them will also be provided. A comparison study was made of several techniques and analysis tools used in email forensics. In addition, this paper compares the available software tools for email forensics based on factors such as language interface, user interface, programming language, creation of image files, calculation of hash value, cost, and advantages.
引用
下载
收藏
页数:28
相关论文
共 50 条
  • [1] A comprehensive examination of email spoofing: Issues and prospects for email security
    Sethuraman, Sibi Chakkaravarthy
    Priya, V. S. Devi
    Reddi, Tarun
    Reddy, Mulka Sai Tharun
    Khan, Muhammad Khurram
    COMPUTERS & SECURITY, 2024, 137
  • [2] Email mining: tasks, common techniques, and tools
    Tang, Guanting
    Pei, Jian
    Luk, Wo-Shun
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (01) : 1 - 31
  • [3] Email mining: tasks, common techniques, and tools
    Guanting Tang
    Jian Pei
    Wo-Shun Luk
    Knowledge and Information Systems, 2014, 41 : 1 - 31
  • [4] Cloud Computing: Security Issues Overview and Solving Techniques Investigation
    Yang, Yu
    Zhao, Chenggui
    Gao, Tilei
    INTELLIGENT CLOUD COMPUTING, 2015, 8993 : 152 - 167
  • [5] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [6] Techniques and issues in multicast security
    Kruus, PS
    Macker, JP
    IEEE MILITARY COMMUNICATIONS CONFERENCE - PROCEEDINGS, VOLS 1-3, 1998, : 1028 - 1032
  • [7] Email issues
    Rosell, R
    TRAINING & DEVELOPMENT, 1997, 51 (10): : 11 - 11
  • [8] An analysis of the security and privacy of email messages used in e-mentoring
    Caffery, Liam
    Stewart, Sarah
    Smith, Anthony C.
    JOURNAL OF TELEMEDICINE AND TELECARE, 2007, 13 : 24 - 26
  • [9] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [10] Email security revisited
    Lampitt, W
    CANADIAN MEDICAL ASSOCIATION JOURNAL, 1997, 157 (05) : 574 - 574