scholarly journals E-Mail Forensics: Techniques and Tools for ForensicInvestigation of One Court Case

Author(s):  
Ljubomir Lazić

E-mail has emerged as the most important application on the Internet for communication of messages, delivery of documents and carrying out transactions and is used not only from computers, but many other electronic gadgets such as mobile phones. This paper is an attempt to illustrate e-mail architecture from forensics perspective.  Also, this paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Furthermore, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions. Our focus is on email header analysis phase offered by the tools. We examine the capability of a particular tools such as EmailTrackerPro and  aid4mail in action. The paper describes the court case of cyber crime, the so-called identity theft in Internet communication via electronic mail by two business entities. Identity theft of e-mail addresses and false communications with a foreign company was carried out in order to indicate that a cash transaction of around EUR 100,000 was paid to the account of NN attackers and not to the account in the domestic Serbian bank.

Author(s):  
Tijana Talić

The increasing use of electronic mail for identity theft and unsolicited marketing and frequent presence of viruses as well, reduced the credibility of email as a communication tool. Authentication of the sender is well known defense against such attacks. One of the methods to ensure that authentication, secure communication via e-mail, is the use of digital signature.


Author(s):  
Svitlana Kutsepal

Internet communication is an important element in the information space structure. It is able to acquire various forms: a web-page, an e-mail page, e-mail (electronic mail), online messages, online communities, virtual subcultures, network slang and behavioral rules that define the content and forms of socializing communication. Internet communication is a consequence of the involvement in the communicative extralinguistic (social, cultural, etc.) factors and realities - computers and computer networks. The modern person does not live in the world of things, but in the world of images, this is especially evident in the representatives of the “digital generation”. That is why the established and time-tested ways of socializing and personality integrating into the social and cultural space do not work under the conditions of information society, where electronic media provide new opportunities for the man to capture an infinite space of information and media life. Information transformations of social and cultural environment of human existence and socialization open up a variety of new possibilities for self-development; the prospect of building an ideal information society opens up, when each person receives equal access to information and the society, with the help of information, follows the way of conscious evolution. Conclusions. Unfortunately, methodology and practice of socialization, which is offered today by educational institutions, no longer corresponds to the needs of providing social and humanocentric orientations for the development of a “digital generation” person, therefore, social and philosophical and philosophical and educational analysis of this problem should become a priority topic of educational discourse. There is an urgent need to develop theoretical and methodological models that will provide an adequate understanding of the innovative nature of social and cultural processes taking place in the information society and prove that information technologies and their infinite possibilities should be cognitive and valuable basis of educational innovations.


2000 ◽  
Vol 23 (1) ◽  
pp. S67-71 ◽  
Author(s):  
J M Machart ◽  
D U Silverthorn

Effective communication between instructors and students is a challenge regardless of the instructor-to-student ratio. Instructors of large classes, in particular, have resorted to various forms of Internet communication, such as mailing lists and newsgroups, to supplement class time and office hours. Mailing lists are closed discussions among subscribers who receive and send messages via an electronic mail program (e.g., Eudora). Newsgroups are public discussions to which anyone can gain access and respond via a newsreader program (e.g., Nuntius). Newsgroup messages are posted to a bulletin board that the subscriber must visit to read. Mailing lists and newsgroups share many advantages (convenience, greater anonymity, and speed of communication) and disadvantages (computer access required, impersonal nature, junk mail, and lack of graphics in older programs). However, surveys of both faculty and students in biology indicate that mailing lists are generally favored over newsgroups. Reasons given for mailing list popularity included greater familiarity with the E-mail format and ease of access.


1993 ◽  
Vol 14 (1) ◽  
pp. 10-11
Author(s):  
Andrew Clement
Keyword(s):  

Temida ◽  
2013 ◽  
Vol 16 (1) ◽  
pp. 151-162
Author(s):  
Vida Vilic

Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.


2019 ◽  
Author(s):  
Didi Bima Yudha

Electronic Commerce (e-commerce) is the process of buying, selling orexchanging products, services and information via computer networks. e- commerce is part of the e-business, where the scope of e-business more broadly, not just commercial but also include business partners, customer service, job vacancies. In addition to networking technologies www, e-commerce technology also requires a database or a database (database), e-mail or electronic mail (e- mail), and the form of non-computer technology as well as other delivery systems, and means of payment for e -Commerce. Given the electronic commerce (e- commerce) is then the customer can access and perform orders from various places. Given the current era of advanced technology is the customer who wants to access e-commerce does not have to be somewhere, it is because in the big cities in Indonesia have a lot of places that provide an internet access facility using only the laptop / notebook or by Personal Digital Assistant (PDA) using wifi technology. Thus the time is now very necessary and desirable companies to implement e-commerceservices. The use of e-commerce in Indonesia is still very limited. From the background that there is then the author will discuss how e- commerce pemanfaaatan in their business interests.


IEEE Spectrum ◽  
1992 ◽  
Vol 29 (10) ◽  
pp. 24-28 ◽  
Author(s):  
T.S. Perry
Keyword(s):  

NAN Nü ◽  
2021 ◽  
Vol 23 (2) ◽  
pp. 237-271
Author(s):  
Guojun Wang

Abstract In late imperial China practitioners of forensic investigation in legal cases were predominantly male. While crime literature frequently features female characters, the question of how this literature represents the gender dimension of forensic knowledge remains unanswered. This paper aims to answer this question with an examination of a number of late imperial era theatrical works that depict how forensic knowledge differed across the male and female divide. It argues court-case literature increasingly valorized male forensic knowledge and its relevance to the state legal system. At the same time, these theatrical pieces signify female forensic knowledge following two literary traditions, namely, the commendation of exemplary women and the condemnation of “wanton women.” Investigating these theatrical works at the interstices between court-case literature, women’s history, and forensic history, this paper suggests that the representations of forensic knowledge in Chinese drama accord with major developments in the history of women and gender in premodern China.


Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


Sign in / Sign up

Export Citation Format

Share Document