14 March 2013 New method for assessing risks of email
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 87682E (2013) https://doi.org/10.1117/12.2010878
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Seyyed Hossein Raja, Seyyed Hossein Raja, Farzad Afrooz, Farzad Afrooz, } "New method for assessing risks of email", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87682E (14 March 2013); doi: 10.1117/12.2010878; https://doi.org/10.1117/12.2010878
PROCEEDINGS
6 PAGES


SHARE
RELATED CONTENT

Client-side Skype forensics: an overview
Proceedings of SPIE (March 07 2013)
Case study of virtual private network
Proceedings of SPIE (July 26 2001)
Access and accounting schemes of wireless broadband
Proceedings of SPIE (April 28 2004)
End-to-end communications security
Proceedings of SPIE (April 18 2006)

Back to Top