CFP last date
20 January 2025
Reseach Article

Email Spoofing

by Rajinder Kumar, Amandeep Jindal, Kunal Pandove
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 1
Year of Publication: 2010
Authors: Rajinder Kumar, Amandeep Jindal, Kunal Pandove
10.5120/881-1252

Rajinder Kumar, Amandeep Jindal, Kunal Pandove . Email Spoofing. International Journal of Computer Applications. 5, 1 ( August 2010), 27-30. DOI=10.5120/881-1252

@article{ 10.5120/881-1252,
author = { Rajinder Kumar, Amandeep Jindal, Kunal Pandove },
title = { Email Spoofing },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 1 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number1/881-1252/ },
doi = { 10.5120/881-1252 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:53:08.747256+05:30
%A Rajinder Kumar
%A Amandeep Jindal
%A Kunal Pandove
%T Email Spoofing
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 1
%P 27-30
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Email spoofing is referred to as malicious activity in which the origin details have been altered so as to make it to appear to origin from a different source. Sending fake emails is usually used to convince the receiver so that he stays unaware of the real sender. Email spoofing may be effectively used to launch phishing attacks on the receivers. The attacker may also use the attack with some amplification and in addition use mass mailer to spam mail users. Infections may be propagated by the means of spoofed emails to attack victims. There are a variety of attackers who do email spoofing. The list starts from people trying to just have fun by sending spoofed messages to users. Other serious attacks are done by wrong doers to make damages to the systems.

References
  1. http://en.wikipedia.org/wiki/E-mail_spoofing
  2. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci840262,00.html
  3. http://en.wikipedia.org/wiki/Phishing
  4. http://www.windowsecurity.com/whitepapers/25-Common-Mistakes-Email-Security.html
  5. http://www.cert.org/tech_tips/email_spoofing.html
  6. http://www.umt.edu/it/email/spoofing.aspx
  7. http://www.ehow.com/list_5924278_disadvantages-pgp-encryption_.html
  8. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci343029,00.html
  9. http://www.eric.ed.gov/ERICWebPortal/custom/portlets/recordDetails/detailmini.jsp?_nfpb=true&_&ERICExtSearch_SearchValue_0=ED415834&ERICExtSearch_SearchType_0=no&accno=ED415834
Index Terms

Computer Science
Information Sciences

Keywords

Email Spoofing Phishing SSL/TLS PGP