CFP last date
20 December 2024
Reseach Article

Email Security

by Rajinder Kumar, Amandeep Jindal, Kunal Pandove
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 1
Year of Publication: 2010
Authors: Rajinder Kumar, Amandeep Jindal, Kunal Pandove
10.5120/882-1253

Rajinder Kumar, Amandeep Jindal, Kunal Pandove . Email Security. International Journal of Computer Applications. 5, 1 ( August 2010), 23-26. DOI=10.5120/882-1253

@article{ 10.5120/882-1253,
author = { Rajinder Kumar, Amandeep Jindal, Kunal Pandove },
title = { Email Security },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 1 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number1/882-1253/ },
doi = { 10.5120/882-1253 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:53:07.933196+05:30
%A Rajinder Kumar
%A Amandeep Jindal
%A Kunal Pandove
%T Email Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 1
%P 23-26
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Organizations can't live without Email and it puts every organization at risk. As a global enabler of communications and collaboration, email simultaneously is the medium of choice for many hackers worldwide. Left unattended, email vulnerabilities can cripple an organization and devastate its brand. Solutions abound, but root causes malware laden spam, email with links to malicious web sites, phishing attempts, intentional and unintended data loss, botnet infestations – persist unabated, growing ever more clever and ever more resistant to detection. Organizations are driven to focus on email security by the need to protect themselves from the damages email attacks can cause.

References
  1. http://www.aberdeen.com/Aberdeen-Library/5981/RA-email-security-phishing.aspx
  2. http://communication.howstuffworks.com/how-email-scams-work.htm
  3. http://www.bitpipe.com/data/detail?id=1256912322_366&type=RES&asrc=SS_SRCH
  4. http://www.bitpipe.com/data/detail?id=1239388805_506&type=RES&asrc=SS_SRCH
  5. http://www.windowsecurity.com/whitepapers/Email_security.html
  6. http://www.itsecurity.com/features/99-email-security-tips-112006/
Index Terms

Computer Science
Information Sciences

Keywords

Email Security damages email attacks