z-logo
open-access-imgOpen Access
A Survey of Email Service; Attacks, Security Methods and Protocols
Author(s) -
Mansoor A. Haider,
Hamish Mohammed
Publication year - 2017
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2017913417
Subject(s) - computer science , computer security , service (business) , internet privacy , world wide web , economy , economics
Email security becomes a sensitive case to study in the field of information security. From the most important security issues of network is how to secure Email from the threats that can be exposed of the security of massages by attackers. In addition, what are the techniques that can be using to secure the Email? Different solutions and several standards levels have been fashioned according to the last security requirements that enhance the Email security. Some of the current enhancements concentrate on keeping the exchange of data through Email in an integral and confident way. While the others concentrate on authenticating the sender and confirm that, client will not repudiate from his message. This paper will explain Email works and discuss different threats in Email Communication and several Email security solutions. This paper introduces several models and techniques utilized to fix and enhance the safety of Email systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom