Paper
14 March 2013 New method for assessing risks of email
Seyyed Hossein Raja, Farzad Afrooz
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 87682E (2013) https://doi.org/10.1117/12.2010878
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Seyyed Hossein Raja and Farzad Afrooz "New method for assessing risks of email", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87682E (14 March 2013); https://doi.org/10.1117/12.2010878
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Relays

Computer security

Network security

Internet

Databases

Digital signal processing

Floods

RELATED CONTENT

Client-side Skype forensics: an overview
Proceedings of SPIE (March 07 2013)
Case study of virtual private network
Proceedings of SPIE (July 26 2001)
Access and accounting schemes of wireless broadband
Proceedings of SPIE (April 28 2004)
End-to-end communications security
Proceedings of SPIE (April 18 2006)

Back to Top