Email Security

Topics: E-mail, Pretty Good Privacy, Internet Pages: 3 (752 words) Published: November 1, 2008
It is a paradox that in spite of the advances in technology that we are witnessing today one's privacy and security of data in the internet is often compromised to a very large extent. Often, personal information of individuals is stolen or financial data of companies are whisked away by elements who could put this information to the wrong use. It is in this scenario that privacy of data has become an important issue for computer users all over the world. Privacy of data becomes more important when one works in a public domain like the Internet. This paper will suggest some of the precautions that an ordinary person needs to take to maintain personal privacy and ensure safety of data while working with emails.

The advent of the internet has changed the way in which technology was being used to support businesses as well as personal needs of users worldwide. Little did people realize that the internet would establish itself as a powerful facilitator of the needs of the common man in such a short period of time. However the same facilities that the Internet offers can also be a potential source for dissemination of our private information without us even knowing about it.

Email security threats may be of many different types. Email security can be compromised by spoofing, identity theft, attacks by modifying existing messages, and imposters [Kangas, 2004]. Hackers may use any or all of these methods to break into a user's computer.

Email security
Email is one of the most potent sources for losing our data because most people are complacent about enforcing email security. Email software is also the most used software among computer users. Hence, any vulnerability of popular email software can be easily exploited by unscrupulous elements to gain entry into the private data of a lot of people. Hence, it is very important that every one use secure email clients for receiving and sending emails. A lot of reputed email clients are available and the...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay on Email Server Proposal
  • Essay about Unit 4 Assignment 1: Smtp Security Best Practices
  • Privacy Laws And Security Measures Essay
  • Final Review Server Security NT2670 Essay
  • Internet Security Essay
  • Overview of Computer Security Essay
  • Cyber Security and Privacy Techniques. Essay
  • Essay on Case Study Mobile Device Security

Become a StudyMode Member

Sign Up - It's Free