Enchancing Email Security – End-to-End Encryption
Author(s):
Sayali Gaikwad, Dr. R.R Dube
Keywords:
E-mail security, Encryption, Key generation, Data storage.
Abstract
Nowadays, the majority of consumers and businesses utilize email for a variety of purposes, including user information communication. One crucial network application is the email client. It is significant when it is used by the business, medical, and educational groups for the transmission of crucial information like business data, patient medical records, and so forth. Data and messages can be easily transmitted between senders and receivers across internal networks or the Internet, enabling messages to be received, forwarded, saved, and broadcast to recipients. Electronic mail is accessible through a wide range of suitable software clients, as well as through a web browser, and is also widely used for personal usage. Electronic mail must be defended on both the sending and receiving sides because of its widespread use, making it both a great target and the main attack vector. Security processing is added to a corporate email implementation's second service model. In a completely outsourced model, the service provider is in charge of keeping track of any risks that use email as a channel (such as spam, phishing, virus propagation, etc.), as well as of providing an email user interface (UI). In the enterprise augmentation concept, extra cloud-based services and functionalists are added to an existing on-premise email implementation. This paper delves into identity federation and data loss prevention, as well as best practices for analyzing, designing, installing, and deploying cloud-based email security services. Target Market Two viewpoints are taken into consideration when discussing email security services: those who offer these services and those who use them or buy them. Both parties must be aware of and make plans for essential service features in order to address threats to email security.
Article Details
Unique Paper ID: 161636

Publication Volume & Issue: Volume 10, Issue 5

Page(s): 255 - 259
Article Preview & Download


Share This Article

Conference Alert

NCSST-2023

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2023

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2023

Go To Issue



Call For Paper

Volume 10 Issue 1

Last Date for paper submitting for March Issue is 25 June 2023

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews