Securing Email Applications from Various Cyber Issues
نویسندگان
چکیده
Information Security and integrity are becoming more important as we use email for personal communication and business. As it is excessively used it is highly prone to Cyber Attacks, threats and malwares. The most common of these are masquerading, modification, and Phishing attacks. In order to provide security against these, many tools have been proposed such as Privacy Enhancement Mail (PEM), Pretty Good Privacy (PGP). Although these tools provide security features like Data Integrity, Non-Repudiation, Encryption, But somewhere fails to provide higher level of Authentication and Confidentiality. This paper focus on the security issues that are still to be overcome even after the use of any of these existing email privacy tools, considering the solutions prevailing to avoid security risks and hence make the email communication security proof. KeywordsCyberattack, Information security, Data Integrity, Authentication, Masquerading, Confidentiality.
منابع مشابه
Mitigating E-Mail Threats - A Web Content Based Application
The World Wide Web is a very powerful and interactive medium and its surveillance is unavoidable for information dissemination. Extracting valuable information from the vast unstructured data is a challenging and critical issue. Web content mining plays an important role in solving these issues. The applications of WWW are widespread and one among it is E-Mail communication. Due to its simple a...
متن کاملA Survey of Cyber foraging systems: Open Issues, Research Challenges
Manas Kumar Yogi Department of Computer Science and Engineering, Pragati Engineering College(Autonomous) Email: [email protected] Darapu Uma Department of Computer Science and Engineering, Pragati Engineering College(Autonomous) Email: [email protected] -------------------------------------------------------------------ABSTRACT-------------------------------------------------------------...
متن کاملVulnerabilities and Countermeasures – A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid
With the increased investment and deployment of embedded computing and communication technologies in the power system – the smart grid vision is shaping up into a reality. The future power grid is a large cyber physical system (CPS) which is vulnerable to cyber security threats. Among the three major subsystems of a power grid – generation, transmission and distribution – this survey focuses on...
متن کاملManaging and Securing Critical Infrastructure - A Semantic Policy and Trust driven approach∗
Cyber physical systems (CPS) and cyber infrastructure are a key elements of the national infrastructure, and securing them is of vital importance to national security. There is ample evidence that these systems are vulnerable to disruption and damage due to natural disasters social crises, and terrorism. CPS applications are becoming more widespread, ranging from healthcare patient monitoring s...
متن کاملA Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. In this paper we address securing cyber infrastructures for ubiquitous computing environments, like smart buildings and campuses. Our emphasis here is to construct a middleware-based critical cyber infrastructure (CCI) that encompasses heterogeneous components and binds networks, proces...
متن کامل