Enchancing Email Security – End-to-End Encryption
Sayali Gaikwad, Dr. R.R Dube
E-mail security, Encryption, Key generation, Data storage.
Nowadays, the majority of consumers and businesses utilize email for a variety of purposes, including user information communication. One crucial network application is the email client. It is significant when it is used by the business, medical, and educational groups for the transmission of crucial information like business data, patient medical records, and so forth. Data and messages can be easily transmitted between senders and receivers across internal networks or the Internet, enabling messages to be received, forwarded, saved, and broadcast to recipients. Electronic mail is accessible through a wide range of suitable software clients, as well as through a web browser, and is also widely used for personal usage. Electronic mail must be defended on both the sending and receiving sides because of its widespread use, making it both a great target and the main attack vector. Security processing is added to a corporate email implementation's second service model. In a completely outsourced model, the service provider is in charge of keeping track of any risks that use email as a channel (such as spam, phishing, virus propagation, etc.), as well as of providing an email user interface (UI). In the enterprise augmentation concept, extra cloud-based services and functionalists are added to an existing on-premise email implementation. This paper delves into identity federation and data loss prevention, as well as best practices for analyzing, designing, installing, and deploying cloud-based email security services. Target Market Two viewpoints are taken into consideration when discussing email security services: those who offer these services and those who use them or buy them. Both parties must be aware of and make plans for essential service features in order to address threats to email security.
Article Details
Unique Paper ID: 161636

Publication Volume & Issue: Volume 10, Issue 5

Page(s): 255 - 259
Article Preview & Download

Share This Article

Conference Alert


AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2023

SWEC- Management


Last Date: 7th November 2023

Go To Issue

Call For Paper

Volume 10 Issue 1

Last Date for paper submitting for March Issue is 25 June 2023

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews