tailieunhanh - Review of e-mail system, security protocols and email forensics

This paper review working and architecture of current email system and the security protocols followed generally to secure our email communications and the limitations they contained, further email forensics which is a process to analyze email contents, header information, transit path for email, sender or receiver information and other details to collect evidence against culprit or to make our system more secure is discussed. It also discusses common email forensic investigation technique and tools used in email forensic process. | ISSN:2249-5789 Dilpreet Singh Bajwa et al , International Journal of Computer Science & Communication Networks,Vol 5(3),201-211 Review of E-mail System, Security Protocols and Email Forensics Gurpal Singh Chhabra Asst. Professor, Thapar University, Punjab (India) Abstract: E-mail is the most common mode of communication today. E-mail not only used for sending messages/text only but also to send audio, video and other files as attachment. It is main resource for business communication. As it is most popular and common mode of communication on internet, it also attracts criminals or persons having mischievous intent. Cyber criminals misuse it for sending spam, threats, Phishing-emails, propagating malicious software like virus and worms, distributing illegitimate material like child pornography, hoaxes and also used for other criminal activities. So it is necessary to secure our e-mail system and also to identify criminal, collect evidence against them and punish them under court of law. This paper review working and architecture of current email system and the security protocols followed generally to secure our email communications and the limitations they contained, further email forensics which is a process to analyze email contents, header information, transit path for email, sender or receiver information and other details to collect evidence against culprit or to make our system more secure is discussed. It also discusses common email forensic investigation technique and tools used in email forensic process. Keywords: E-mail, E-mail Architecture, E-Mail Security Protocol, E-mail Forensics, E-mail Investigation, E-mail Forensics Tools. Introduction: E-mail is popular internet application. Millions of user daily uses e-mail for personal, business or for official purpose. As e-mail system influence our life so much today in a positive way, on the other way cyber criminals are also using e-mail as tool to fulfill their malafide intentions.