Reference Hub6
Introduction to Email, Web, and Message Forensics

Introduction to Email, Web, and Message Forensics

Mohammad Zunnun Khan, Mohd. Shahid Husain, Mohd. Shoaib
Copyright: © 2020 |Pages: 13
ISBN13: 9781799815587|ISBN10: 1799815587|ISBN13 Softcover: 9781799815594|EISBN13: 9781799815600
DOI: 10.4018/978-1-7998-1558-7.ch010
Cite Chapter Cite Chapter

MLA

Khan, Mohammad Zunnun, et al. "Introduction to Email, Web, and Message Forensics." Critical Concepts, Standards, and Techniques in Cyber Forensics, edited by Mohammad Shahid Husain and Mohammad Zunnun Khan, IGI Global, 2020, pp. 174-186. https://doi.org/10.4018/978-1-7998-1558-7.ch010

APA

Khan, M. Z., Husain, M. S., & Shoaib, M. (2020). Introduction to Email, Web, and Message Forensics. In M. Husain & M. Khan (Eds.), Critical Concepts, Standards, and Techniques in Cyber Forensics (pp. 174-186). IGI Global. https://doi.org/10.4018/978-1-7998-1558-7.ch010

Chicago

Khan, Mohammad Zunnun, Mohd. Shahid Husain, and Mohd. Shoaib. "Introduction to Email, Web, and Message Forensics." In Critical Concepts, Standards, and Techniques in Cyber Forensics, edited by Mohammad Shahid Husain and Mohammad Zunnun Khan, 174-186. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1558-7.ch010

Export Reference

Mendeley
Favorite

Abstract

With the advent of information and communication technologies, e-mail is one of the prime tools for communication. Almost everyone uses emails for business communications as well as for sharing personal information. E-mail is vulnerable against cybercrimes. This chapter focuses on the basic concepts of web forensics and then provides an insight about the e-mailing policies, email architecture, and existing investigation techniques used by forensic investigators. Most of the organizations implement some standard e-mailing policies; however, it is not sufficient to handle and prevent the digital crimes. We need to monitor and investigate emails for proper check. This chapter discusses some prominent tools and techniques through which forensic experts can gather and analyze data about suspected email accounts for investigation and produce evidence in the court of law.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.