Email Security Issues, Tools, and Techniques Used in Investigation

被引:2
|
作者
Altulaihan, Esra [1 ]
Alismail, Abrar [1 ]
Rahman, M. M. Hafizur [1 ]
Ibrahim, Adamu A. [2 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun, Al Hasa 31982, Saudi Arabia
[2] Int Islamic Univ Malaysia IIUM, Dept Comp Sci, KICT, Kuala Lumpur 53100, Malaysia
关键词
email; security; email forensics; threats; investigation; email analysis; tools; techniques;
D O I
10.3390/su151310612
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The email system is a globally distributed communication infrastructure service that involves multiple actors playing different roles to ensure end-to-end mail delivery. It is an indispensable method of communicating that is changing how people share data and information. As a result, it facilitates effective and efficient communication, especially in business, as well as convenience, accessibility, and replication. Today, email can send more than just text files; it can also send audio, video, photos, and other files with extensions. With email becoming ubiquitous in all aspects of our lives, enhancing its security, operating procedures, and forensic investigation has become essential. The purpose of this paper is to review some real email forensic incidents and the tools and techniques that have been proposed. A discussion of the major threats to email as well as techniques to mitigate them will also be provided. A comparison study was made of several techniques and analysis tools used in email forensics. In addition, this paper compares the available software tools for email forensics based on factors such as language interface, user interface, programming language, creation of image files, calculation of hash value, cost, and advantages.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] Tools for Email Based Recommendation in Enterprise
    Laclavik, Michal
    Seleng, Martin
    Dlugolinsky, Stefan
    Gatial, Emil
    Hluchy, Ladislav
    ENTERPRISE INFORMATION SYSTEMS PT I, 2010, 109 : 209 - 218
  • [32] Quality-Aware Mashup Composition: Issues, Techniques and Tools
    Cappiello, C.
    Matera, M.
    Picozzi, M.
    Daniel, F.
    Fernandez, A.
    2012 EIGHTH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC 2012), 2012, : 10 - 19
  • [33] Big data analytics in bioinformatics: architectures, techniques, tools and issues
    Kashyap H.
    Ahmed H.A.
    Hoque N.
    Roy S.
    Bhattacharyya D.K.
    Network Modeling Analysis in Health Informatics and Bioinformatics, 2016, 5 (1)
  • [34] Information-Driven Security Analysis: Tools and Techniques for the Study and Practice of Security Engineering
    Whitmore, Jim
    COMPUTER, 2023, 56 (06) : 107 - 120
  • [35] An Email Server Optimized for Storage Issues
    Li, Yi
    Zhang, Mingzhe
    Gu, Jiaqi
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1437 - 1443
  • [36] An investigation of various security and privacy issues in Internet of Things
    Singhai R.
    Sushil R.
    Materials Today: Proceedings, 2023, 80 : 3393 - 3397
  • [37] Experimental investigation of security issues in O-CDMA
    Jiang, Zhi
    Leaird, Daniel E.
    Weiner, Andrew M.
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2006, 24 (11) : 4228 - 4234
  • [38] Balancing Security and Usability in Encrypted Email
    Bai, Wei
    Kim, Doowon
    Namara, Moses
    Qian, Yichen
    Gage Kelley, Patrick
    Mazurek, Michelle L.
    IEEE INTERNET COMPUTING, 2017, 21 (03) : 30 - 38
  • [39] Techniques and tools used in archive work applicable to the teaching process
    Borcoman, Mariana
    ADVANCED EDUCATIONAL TECHNOLOGIES (EDUTE 10), 2010, : 98 - 102
  • [40] A survey on smart power grid: frameworks, tools, security issues, and solutions
    Gupta, B. B.
    Akhtar, Tafseer
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) : 517 - 549