Skip to main content

Posts

Showing posts from December, 2022

Network Security Threats

Network Security Threats Introduction: Security plays a very critical role in safeguarding networks that are connecting more and more people every day. Information that is being exchanged between networked computers is very vulnerable to attacks. This increases the security challenges for network security  professionals to protect the information and  identity of users connected globally. Network  security is needed in almost every field  and includes small and large organizations,  governmental  entities, homes, and  even countries at large.  Over the last few years, it has been observed that there is a massive increase in hacking and other malicious activities. Moreover, many threats are being created for the sole purpose of acquiring the personal information of users. Therefore, it is important to use a security program that can provide complete proactive protection, i.e., it can safeguard you before you get infected. In this chapter, we look at the categories of network security th

Exploring Electronic Mail

Introduction   Email is the most commonly used mode of communication today. Information is communicated over email in different forms such as text, images, audio, and video. It is the main resource for business communication. As it has become an undetachable medium of communication, it attracts criminals or persons having malicious intent. Cybercriminals use email for sending spam, threats, phishing emails, propagating malicious software like viruses and worms, distributing illegitimate material like child pornography, and hoaxes, and using it for other criminal activities. Therefore, it is necessary to secure our email system and to identify criminals, collect evidence against them and bring them to justice in a court of law. Emails suffer from multiple threats and there are several tools available in the market for fighting such threats. To secure emails, we need a multi-pronged approach. Multiple safety measures need to be implemented to have a safe online experience. In this chapte