Friday, May 15, 2020

Types Of Cyber Crimes Performed Through E Mail - 1705 Words

Introduction The topic of discussion that was proposed by Rachid Hadjidj, Mourad Debbabi*, Hakim Lounis, Farkhund Iqbal, Adam Szporer, Djamel Benredjem was a new technique in uncovering e-mail forensic data for use in a court of law. Different types of cyber crimes performed through e-mail include â€Å"spamming, phising, drug trafficking, cyber bullying, racial vilification, child pornography, sexual harassment, etc.† Suspected e-mail accounts are examined by forensic analysis and data is captured in order to prove crimes in court. The amount of e-mail cyber crimes that manifest is proof that there is a need for a software tool that can be an all encompassing e-mail analyzer in order to capture the needed forensic data. The writers propose†¦show more content†¦One limitation is that there is no message encryption at the sender end and/or an integrity check for the recipient to identify if the sender is trustworthy. The second limitation is that Simple Mail Transfer Protocol (SMT P) does not have source authentication and header metadata can be easily modified to hide who is sending the e-mail. For these reasons forensic analysts need a tool that can identify people who are sending e-mails when messages may be anonymously sent and contain malicious intent. Cyber forensic investigation with respect to e-mails is the collection of credible evidence through analyzing e-mail collections to prosecute criminals. Analytics should include keyword searches, authorship attribution, and computing statistics. The writers of the article have combined social network analysis with these analytics to create a tool that can track who might be accomplices to malicious e-mailing. Their framework is titled Integrated E-mail Forensic Analysis Framework (IEFAF). With traditional authorship attribution, the writing style of a person is examined by using an entire collection of e-mails without regards to whom they are written. Further more stylometric features are assumed consisten t and not controlled by the writer. The writers of the article have proposed that there could be variation in writing style of e-mails dependent upon certain context, recipient, and even time of day. Their proposed approach for authorship

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.