DocumentCode :
2704032
Title :
Anatomy of compromising email accounts
Author :
Khanna, Seema ; Chaudhry, Harish
Author_Institution :
Nat. Inf. Center, New Delhi, India
fYear :
2012
fDate :
6-8 June 2012
Firstpage :
640
Lastpage :
645
Abstract :
Click! You open an email and you are hacked. Your password reaches the hacker while you read the contents of the innocuous looking email. With hacking on an upward spiral, hacking of an email account occurs everywhere. An email account becomes a lucrative proposition if it is deployed on a domain which has critical importance in terms of data, both from a commercial perspective and espionage. This brings us to the vital question? How easy is it to compromise an email account? Despite the encryption, email accounts are getting compromised. This publication aims to discuss the ways in which emails can be compromised. This study is an examination of the analysis found in the ways adopted by hackers/attackers at various levels to gain access to an email account. This work intends to increase the understanding and awareness of the internet user across the globe and discuss plausible countermeasures at the users level as well. This conceptual paper will contribute to future research on similar topics.
Keywords :
Internet; authorisation; cryptography; electronic mail; hobby computing; Internet user; access gain; e-mail account hacking; encryption; lucrative proposition; password; Automation; Conferences; Cookie Stealing; DHA; Hijacking; MITM; Phishing; compromising; email; email account; hacked;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Automation (ICIA), 2012 International Conference on
Conference_Location :
Shenyang
Print_ISBN :
978-1-4673-2238-6
Electronic_ISBN :
978-1-4673-2236-2
Type :
conf
DOI :
10.1109/ICInfA.2012.6246756
Filename :
6246756
Link To Document :
بازگشت