Electronic Mail Security

Electronic Mail Security

Edwin I. Achugbue (Delta State University, Nigeria)
DOI: 10.4018/978-1-61520-847-0.ch010
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.
Chapter Preview
Top

History Of E-Mail

Electronic mail began as a simple messaging scheme in the first time – Compatible Time sharing systems (CTSS) at Massachusetts Institute of Technology (MIT), Dartmouth Time Sharing System (DTSS at Dartmouth) in the 1960s. A message sender would use a very simple interface to place the message in a file accessible by another user. The user could then read the messages directly from the file. It was not until after key elements of the Arpanet were created at Bolt, Beraneck, and Newman (BBN) in 1969 that e-mail messages were sent between computers. This seminal event took place in 1971 following an experiment by Ray Tomlinson in a BBN lab (Raiston, Burke, Nakayoma & Tolani, 2004, Turner & Housley 2008). This simple experiment began an explosion that soon dominated the use of the Arpanet and its successor, the Internet. By 1973, three quarter of all traffic on the Arpanet was e-mail and Ray Tomlinson had gained both fame and notoriety as the inventor of today’s standard at sign @-base e-mail address. According to Raiston, Burke, Nakayama and Tolani (2004) “The notoriety was due to early systems such as Tenex which had difficulty with the @” (299 p), other early net works such as UCPnet and Bitnet quickly adopted the system.

Key Terms in this Chapter

E-Mail: Electronic mail carried on the Net

E-Mail Address: The unique private Internet address to which e-mail is sent

Attachment: File included in e-mail

HTML: Stands for Hyper Text makeup Language - the language used to create web document.

Hacker: Someone who breaks into people’s computer.

Cyber: A term used for computer network or virtual

Cracker: Someone who gains unauthorized access to computer.

Complete Chapter List

Search this Book:
Reset