[go: up one dir, main page]

Khan et al., 2020 - Google Patents

Introduction to email, web, and message forensics

Khan et al., 2020

Document ID
13540363967160704667
Author
Khan M
Husain M
Shoaib M
Publication year
Publication venue
Critical concepts, standards, and techniques in cyber forensics

External Links

Snippet

With the advent of information and communication technologies, e-mail is one of the prime tools for communication. Almost everyone uses emails for business communications as well as for sharing personal information. E-mail is vulnerable against cybercrimes. This chapter …
Continue reading at www.igi-global.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/589Message switching systems, e.g. electronic mail systems unified messaging, e.g. interactions between instant messaging [IM], e-mail or other types of messages such as Converged IP Messaging [CPM]

Similar Documents

Publication Publication Date Title
US11595353B2 (en) Identity-based messaging security
US10181957B2 (en) Systems and methods for detecting and/or handling targeted attacks in the email channel
US10715543B2 (en) Detecting computer security risk based on previously observed communications
US9635042B2 (en) Risk ranking referential links in electronic messages
US8751808B2 (en) Method and system for sharing trusted contact information
US10326779B2 (en) Reputation-based threat protection
US20220353242A1 (en) Entity-separated email domain authentication for known and open sign-up domains
US9177293B1 (en) Spam filtering system and method
Chhabra et al. Review of e-mail system, security protocols and email forensics
US20120216040A1 (en) System for Email Message Authentication, Classification, Encryption and Message Authenticity
US20120331126A1 (en) Distributed collection and intelligent management of communication and transaction data for analysis and visualization
Banday Techniques and Tools for Forensic Investigation of E-mail
Tatang et al. A first large-scale analysis on usage of mta-sts
Khan et al. Introduction to email, web, and message forensics
Akinbi et al. Forensic analysis of open-source XMPP multi-client social networking apps on iOS devices
Banday Technology corner: analysing e-mail headers for forensic investigation
Charalambou et al. Email forensic tools: A roadmap to email header analysis through a cybercrime use case
Mishra et al. Forensic analysis of e-mail date and time spoofing
Rahalkar et al. Sok: content moderation schemes in end-to-end encrypted systems
CN116708019A (en) A cloud mailbox security monitoring method, device, equipment and storage medium
Msongaleli et al. Electronic mail forensic algorithm for crime investigation and dispute settlement
SANCHEZ et al. A security analysis of email communications
LAZIĆ et al. E-mail forensics: techniques and tools for forensic investigation
Pavanello et al. OSINT-based Email Analyzer for Phishing Detection
Lazić EMail FORENSICS: TECHNIQUES AND TOOLS FOR FORENSICINVESTIGATION OF ONE COURT CASE