Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{161636, author = {Sayali Gaikwad and Dr. R.R Dube}, title = {Enchancing Email Security – End-to-End Encryption }, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {10}, number = {5}, pages = {255-259}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=161636}, abstract = {Nowadays, the majority of consumers and businesses utilize email for a variety of purposes, including user information communication. One crucial network application is the email client. It is significant when it is used by the business, medical, and educational groups for the transmission of crucial information like business data, patient medical records, and so forth. Data and messages can be easily transmitted between senders and receivers across internal networks or the Internet, enabling messages to be received, forwarded, saved, and broadcast to recipients. Electronic mail is accessible through a wide range of suitable software clients, as well as through a web browser, and is also widely used for personal usage. Electronic mail must be defended on both the sending and receiving sides because of its widespread use, making it both a great target and the main attack vector. Security processing is added to a corporate email implementation's second service model. In a completely outsourced model, the service provider is in charge of keeping track of any risks that use email as a channel (such as spam, phishing, virus propagation, etc.), as well as of providing an email user interface (UI). In the enterprise augmentation concept, extra cloud-based services and functionalists are added to an existing on-premise email implementation. This paper delves into identity federation and data loss prevention, as well as best practices for analyzing, designing, installing, and deploying cloud-based email security services. Target Market Two viewpoints are taken into consideration when discussing email security services: those who offer these services and those who use them or buy them. Both parties must be aware of and make plans for essential service features in order to address threats to email security. }, keywords = {E-mail security, Encryption, Key generation, Data storage.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry