Preview

Email Security

Good Essays
Open Document
Open Document
752 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Email Security
It is a paradox that in spite of the advances in technology that we are witnessing today one's privacy and security of data in the internet is often compromised to a very large extent. Often, personal information of individuals is stolen or financial data of companies are whisked away by elements who could put this information to the wrong use. It is in this scenario that privacy of data has become an important issue for computer users all over the world. Privacy of data becomes more important when one works in a public domain like the Internet. This paper will suggest some of the precautions that an ordinary person needs to take to maintain personal privacy and ensure safety of data while working with emails.

Analysis
The advent of the internet has changed the way in which technology was being used to support businesses as well as personal needs of users worldwide. Little did people realize that the internet would establish itself as a powerful facilitator of the needs of the common man in such a short period of time. However the same facilities that the Internet offers can also be a potential source for dissemination of our private information without us even knowing about it.

Email security threats may be of many different types. Email security can be compromised by spoofing, identity theft, attacks by modifying existing messages, and imposters [Kangas, 2004]. Hackers may use any or all of these methods to break into a user's computer.

Email security
Email is one of the most potent sources for losing our data because most people are complacent about enforcing email security. Email software is also the most used software among computer users. Hence, any vulnerability of popular email software can be easily exploited by unscrupulous elements to gain entry into the private data of a lot of people. Hence, it is very important that every one use secure email clients for receiving and sending emails. A lot of reputed email clients are available and the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The Second threat is Spam. Spam is expected to increase to 80 to 90 percent of total email. Moreover, the boundary between spam and viruses is blurring. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information.…

    • 546 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mail may have confidential information. It may contain personal information about employees or contain business secrets such as names and other personal details of customers.…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    BUSN150 Final Exam

    • 2169 Words
    • 9 Pages

    13. If one's personal information on e-mails is respected as property, using the example of Google, it can be said that…

    • 2169 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Emails can be used to send information to individuals or a whole company, there are many different facilities within email software that can ensure the recipient has read the email this is important if the email contained time critical information. Also as email can be used as a legal form of communication it can be used to send contractual information and purchase orders.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 210 handling mail

    • 510 Words
    • 3 Pages

    Mail may have confidential information. It may include personal information about employees or contain business secrets such as the names of customers and confidential information related to the business, customers and clients. Also, mails and packages have to be checked for suspicious features. So security procedures will have to be followed while dealing with mails and packages.…

    • 510 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Emails can be hacked by various methods, and no one is immune. Recently even Presidents G.H. and G.W. Bush have had their emails hacked and information downloaded (Kim, 2013), (Rumors, 2013). By using different methods and the internet, Hackers are using Social Engineering, Google Hacking and Workplace Sabotage from a disgruntled former employee or ones who feels that they have an injustice done to them and are motivated for revenge (Link, 2013).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Sending and receiving, emails are useful as the sender can attach documents to the email they sent. These can be word documents, spreadsheets, sound files or images. Bearing in mind when sending an email it's important to know the competence of the recipient for that email - there is no point in sending email if the person receiving it can’t understand or doesn't know how to open it!…

    • 2519 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    AtekPC

    • 286 Words
    • 2 Pages

    In 2007, a major news magazine ran a cover article entitled "Whither the PC?" The threats reported in their analysis were worldwide and stemmed from a variety of factors including the growing popularity of 1110bile phones, PDAs, and Web-based application software. For most people, e-mail is the 1110St important application that they use. For a long period of time, sending and receiving e-mail necessitated having a full-ncdged Pc. Nowadays, though, businesspcople and consumcrs want to reap the benefit of being able to access e-mail from anywhere, 24-7.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Health 101 Notes

    • 2457 Words
    • 10 Pages

    In modern American life, we organize our lives on our personal digital assistants, and send and receive e-mail on our computers.…

    • 2457 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Email is one of the best and worst techinque the world have ever got but come with problems. Email is good because it fast relieable but any one can forward it to your best or worst friend or even to some one you dont want to see it. Sending the wrong Email can land you in jail and all Email dont have to be read. Spam Emails dont have to be read because it be junk mail. Its never ok to fire someone via emai because its can lead to a lawsuit. So all they saying is never send stuff though email you never want people to see or…

    • 110 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives.…

    • 1849 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Internet Privacy Ethics

    • 1380 Words
    • 6 Pages

    The citizens of the United States have always been keen on privacy. A new emerging issue is on Internet Privacy issues. Privacy issues can lead to devastating consequences such as identity theft and bad credit ratings. Many users of the internet do not know the level of security or privacy of a website they access. There are many uncertainties when using the internet. How can we trust that our personal information is safe? How do we know that we actually have privacy? How do advertisers obtain our personal information? Are there actually laws regarding internet privacy?…

    • 1380 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays

Related Topics