Khan et al., 2020 - Google Patents
Introduction to email, web, and message forensicsKhan et al., 2020
- Document ID
- 13540363967160704667
- Author
- Khan M
- Husain M
- Shoaib M
- Publication year
- Publication venue
- Critical concepts, standards, and techniques in cyber forensics
External Links
Snippet
With the advent of information and communication technologies, e-mail is one of the prime tools for communication. Almost everyone uses emails for business communications as well as for sharing personal information. E-mail is vulnerable against cybercrimes. This chapter …
- 238000009114 investigational therapy 0 abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/589—Message switching systems, e.g. electronic mail systems unified messaging, e.g. interactions between instant messaging [IM], e-mail or other types of messages such as Converged IP Messaging [CPM]
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11595353B2 (en) | Identity-based messaging security | |
| US10181957B2 (en) | Systems and methods for detecting and/or handling targeted attacks in the email channel | |
| US10715543B2 (en) | Detecting computer security risk based on previously observed communications | |
| US9635042B2 (en) | Risk ranking referential links in electronic messages | |
| US8751808B2 (en) | Method and system for sharing trusted contact information | |
| US10326779B2 (en) | Reputation-based threat protection | |
| US20220353242A1 (en) | Entity-separated email domain authentication for known and open sign-up domains | |
| US9177293B1 (en) | Spam filtering system and method | |
| Chhabra et al. | Review of e-mail system, security protocols and email forensics | |
| US20120216040A1 (en) | System for Email Message Authentication, Classification, Encryption and Message Authenticity | |
| US20120331126A1 (en) | Distributed collection and intelligent management of communication and transaction data for analysis and visualization | |
| Banday | Techniques and Tools for Forensic Investigation of E-mail | |
| Tatang et al. | A first large-scale analysis on usage of mta-sts | |
| Khan et al. | Introduction to email, web, and message forensics | |
| Akinbi et al. | Forensic analysis of open-source XMPP multi-client social networking apps on iOS devices | |
| Banday | Technology corner: analysing e-mail headers for forensic investigation | |
| Charalambou et al. | Email forensic tools: A roadmap to email header analysis through a cybercrime use case | |
| Mishra et al. | Forensic analysis of e-mail date and time spoofing | |
| Rahalkar et al. | Sok: content moderation schemes in end-to-end encrypted systems | |
| CN116708019A (en) | A cloud mailbox security monitoring method, device, equipment and storage medium | |
| Msongaleli et al. | Electronic mail forensic algorithm for crime investigation and dispute settlement | |
| SANCHEZ et al. | A security analysis of email communications | |
| LAZIĆ et al. | E-mail forensics: techniques and tools for forensic investigation | |
| Pavanello et al. | OSINT-based Email Analyzer for Phishing Detection | |
| Lazić | EMail FORENSICS: TECHNIQUES AND TOOLS FOR FORENSICINVESTIGATION OF ONE COURT CASE |