In today’s electronic
world, E-Mail is critical to any business being competitive. In most
cases it now forms the backbone of most organizations’ day-to-day
activities, and its use will continue to grow. E-Mails have enabled
an efficient means of communication, without the limitations of time
zones, speed or cost, usually associated with many of the other forms
of communication. Though it has lot of advantages, however; E-Mails
can easily be used for the negative purposes as well, making SPAM and
virus E-Mails a problem especially by the hackers. In this Unit,
we’ll understand the key elements that comprise a successful E-Mail
Crime & its Investigation and eventually work out on securing the
E-Mails.
E-Mail is now considered
to be most important in the area of information technology. Hackers
come with various sophisticated tools and techniques to invade
computers and stealing personal details of users from their E-Mail
accounts. There are various traditional security measures available,
but in most of the cases it is useless to fight against the latest
attacks. So, to protect E-Mails every user/ company should adopt the
right security software on computer. The Internet has opened up new
doors of opportunities for both private individuals and companies.
However, there are different types of viruses, malware and other
harmful items that may cause your computer.
Now-a-days,
most of the companies implement online transactions and not only the
companies but an individual also reap the benefits of the internet.
They shop online and also carry out other financial transactions
online and somehow keep their personal, financial, and credit card
information, Bank Statements etc. in their E-Mail. So, the risk of
hacking has also gone up significantly. Due to this reason sufficient
assurance for a network, software, and PC are no longer enough. In
order to protect the information and data, it has become the need of
the hour to adopt new methods, techniques and various tools to
implement the optimum level of security.
Electronic
mail, which is commonly known as E-Mail is a method of exchanging
digital messages across the Internet or other computer networks.
E-Mail systems are based on a store-and-forward model in which E-Mail
server computer systems accept, forward, deliver and store messages
on behalf of users, who only need to connect to the E-Mail
infrastructure. Typically an E-Mail server, with a network-enabled
device for the duration of message submission or retrieval.
Originally, E-Mail was transmitted directly from one user's device to
another user's computer, which required both computers to be
connected online at the same time.
An
electronic mail message consists of two components, the message
header, and the message body, which is the E-Mail’s content. The
message header contains control information, including, minimally, an
originator's E-Mail address and one or more recipient addresses.
Usually additional information is added, such as a subject header
field. Originally a text-only communications medium, E-Mail was
extended to carry multi-media content attachments, which was
standardized in RFC 2045 through RFC 2049, collectively called,
Multipurpose Internet Mail Extensions (MIME).
The
foundation for today's global Internet E-Mail services reaches back
to the early ARPANET and standards for encoding of messages were
proposed as early as 1973 (RFC 561). An E-Mail sent in the early
1970s looked very similar to one sent on the Internet today.
Conversion from the ARPANET to the Internet in the early 1980s
produced the core of the current services.
Network-based
E-Mail was initially exchanged on the ARPANET in extensions to the
File Transfer Protocol (FTP), but is today carried by the Simple Mail
Transfer Protocol (SMTP), first published as Internet standard 10
(RFC 821) in 1982. In the process of transporting E-Mail messages
between systems, SMTP communicates delivery parameters using a
message envelope separately from the message (header and body)
itself.
No comments:
Post a Comment