2020
DOI: 10.31272/jeasd.24.4.2
|View full text |Cite
|
Sign up to set email alerts
|

Digital Cyber Forensics Contribution for Email Analysis

Abstract: In the past two decades, the Internet has become as open, publicly and widely used as a source of data transmission and exchanging the messages between criminals, terrorists and those who have illegal motivations. Moreover, exchanging important data between various military and financial institutions, even ordinary citizens. From this view, there is one of the important means of exchanging information widely used on the Internet medium is e-mail. Email messages are digital evidence that has been become one of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…This process is often employed by malicious actors for nefarious purposes, such as sending spam or phishing emails. Email spoofing has several implications, as it can be used to disguise the true source of an email and, consequently, mask its malicious intent [19][20][21][22]. Phishing is a form of cybercrime that employs social engineering and technological deception to obtain bank account identities and passwords [20].…”
Section: Email Abuse Scenarios and Threats In Email Communicationmentioning
confidence: 99%
See 1 more Smart Citation
“…This process is often employed by malicious actors for nefarious purposes, such as sending spam or phishing emails. Email spoofing has several implications, as it can be used to disguise the true source of an email and, consequently, mask its malicious intent [19][20][21][22]. Phishing is a form of cybercrime that employs social engineering and technological deception to obtain bank account identities and passwords [20].…”
Section: Email Abuse Scenarios and Threats In Email Communicationmentioning
confidence: 99%
“…The analysis will include a detailed examination of the features and functionalities that the tools offer, as well as their associated costs. There are several techniques that are useful for conducting an email investigation during this step, including header investigation, server investigation, investigation of software-embedded details, investigation and discovery of hidden emails, and investigation of anti-forensic activity [20,21]. During the header investigation, the header is critical for inquiry and evidence collecting.…”
Section: Previous Empirical Studies Associated With Email Abuse Inves...mentioning
confidence: 99%