Researching and Structuring e-mail Security Criteria
نویسندگان
چکیده
Validity and efficiency of e-mail use in business communication have not been disputable for a long time. But what is disputable is security and risks of e -mail use. It is in danger because of threats coming from different sources and forms of work. E-mail content, computer data, corporative networks as well as business processes and image and partner’s trust can also be in danger. This paper highlights proportions of e-mail (in)security in business environment. E-mail security strategies and technologies, as well as their limitations are being discussed. As a recommendation for email security managing, the role of security policies is being explained as well as the need for defining criteria that are missing in practice. After researching the best experience, security standards directions, and business process features, e-mail security criteria are structured and the ways of their implementation in business environment are shown in this paper.
منابع مشابه
Catalog of Security Tactics linked to Common Criteria Requirements
Security tactics describe security design decisions in a very general, abstract, and implementation-independent way and provide basic security design guidance. Tactics directly address system quality attributes and can be seen as building blocks for design patterns. In order to establish a more detailed security tactic collection, we link them with the Common Criteria security certification sta...
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملGenetic and Memetic Algorithms for Sequencing a New JIT Mixed-Model Assembly Line
This paper presents a new mathematical programming model for the bi-criteria mixed-model assembly line balancing problem in a just-in-time (JIT) production system. There is a set of criteria to judge sequences of the product mix in terms of the effective utilization of the system. The primary goal of this model is to minimize the setup cost and the stoppage assembly line cost, simultaneously. B...
متن کاملA New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection
Emails are one of the fastest economic communications. Increasing email users has caused the increase of spam in recent years. As we know, spam not only damages user’s profits, time-consuming and bandwidth, but also has become as a risk to efficiency, reliability, and security of a network. Spam developers are always trying to find ways to escape the existing filters therefore new filters to de...
متن کاملA Study of the Role of Using E-mail in Improving High School Students’ EFL Writing Skill
The present study investigates the effect of e-mail on Iranian learners of English and focuses on teaching thewriting skillvia e-mail. More specifically, the study investigates (a) whether using e-mail has any statistically significant effect on improving high school students' writing skill, and (b) whether the proficiency level has any relation with students’ writing improvement through using ...
متن کامل