Introduction to Email, Web, and Message Forensics

Introduction to Email, Web, and Message Forensics

Mohammad Zunnun Khan, Mohd. Shahid Husain, Mohd. Shoaib
Copyright: © 2020 |Pages: 13
DOI: 10.4018/978-1-7998-1558-7.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the advent of information and communication technologies, e-mail is one of the prime tools for communication. Almost everyone uses emails for business communications as well as for sharing personal information. E-mail is vulnerable against cybercrimes. This chapter focuses on the basic concepts of web forensics and then provides an insight about the e-mailing policies, email architecture, and existing investigation techniques used by forensic investigators. Most of the organizations implement some standard e-mailing policies; however, it is not sufficient to handle and prevent the digital crimes. We need to monitor and investigate emails for proper check. This chapter discusses some prominent tools and techniques through which forensic experts can gather and analyze data about suspected email accounts for investigation and produce evidence in the court of law.
Chapter Preview
Top

Email Forensics

Email communication is also on target. Because it is one of the most popular and commonalty used means of online communication, for both prospects individuals and businesses, emails are normally used by organizations to exchange most simple information, such as meeting schedules, document distribution and some sensitive information (Marwan Al-Zarouni, 2004).

Key Terms in this Chapter

Server Investigation: Part of header analysis.

Web Forensics: Web forensics relates to any sort of crime committed over the internet. With proper knowledge and expert skills, criminal activities like child pornography.

Message Forensics: Investigation is quite obvious: there are several applications, each storing information in different areas.

Header Analysis: A detailed header analysis of a multiple tactic spoofed e-mail message is carried out.

Bait Tactics: Header analysis various other approaches that can be used for e-mail forensics include bait tactics, server investigations, and network device investigation.

Email Forensics: Email forensics refers to analyzing the source and content of emails as evidence. Investigation of email related crimes and incidents involve various approaches.

Software-Embedded Identifiers: Also a part of header analysis.

Complete Chapter List

Search this Book:
Reset