AbstractsComputer Science

Design and development of efficient techniques for securing E mail system from threats;

by Tariq Banday




Institution: University of Kashmir
Department:
Year: 2015
Keywords: Electronic mail-Infrastructure-Protocols
Record ID: 1194922
Full text PDF: http://shodhganga.inflibnet.ac.in/handle/10603/39952


Abstract

Electronic Mail e mail is one of the early applications of internetworks which newlinesubsequently became the first widely used application of the Internet It created an newlineelectronic version of conventional mail system allowing massages to be sent more newlinequickly and easily in a manner similar to conventional postal system Today e mail has newlineemerged as an affordable valuable and crucial worldwide business tool that not only supports conversation between parties but also supports delivery of documents and newlinearchives of diverse nature The primary protocol for E mail transfer does not define any security and privacy policy and lacks security features for privacy of conversation authentication of sending party integrity of e mail message non repudiation by sender and consistency of the envelope It is thus not completely secure while it is being transmitted and also requires a huge storage space for backups The arteries of e mail have become literally clogged by spam viruses and any other content that can be sent via e mail Spam e mails often contain offensive fraudulent adult oriented and misleading material that cause several problems either directly or indirectly to the e mail system that include i network conjunction ii misuse of storage space and computational resources iii loss of work productivity and annoyance to users iv legal issues as a result of pornographic advertisements and other objectionable material v financial losses through phishing and other related attacks vi spread of viruses worms and Trojan Horses and vii Denial of Services and Directory Harvesting attacks newline%%%