Review all the learning materials (links and videos) for best practices and how
ID: 3593914 • Letter: R
Question
Review all the learning materials (links and videos) for best practices and how email security can go wrong. Now use what you have learned to research how you can implement a plan to keep corporate email secure as part of your security infrastructure plan. What are the things you can implement as part of the strategy that will protect your company from becoming a statistic? Write your results in the form of a paper – should be at least 4 pages (double spaced) with implementations, facts, case study examples, and conclusion.
Explanation / Answer
Solution:
Email security can be explained as the collective measure that is taken to secure and control the access on the content of an email account or its data and services. It allows an organization to protect the overall access to one or more email id and accounts.
The work of the email security is an email service provider i.e an email service provider implements the email security for an organization and it also secures subscriber the email account and the data from the hackers, when the user active or inactive.
general things which are very essential for a user who is using mail are as follows:
Try to get a good and strong passwordd
So now lets us understand that how an email id or email account can be hacked. So let me first tell you that there are many ways and still new ways are introducing by which your account can be hacked. Firstly and most important never leave your laptop or device open or unlocked in public places because you never know anyone can come and can attack your system and can get all the information of your system.
The most dangerous attack which user does not get to know is the man in the middle attack in this type of attack an attacker is between the two users who are communicating with each other and they both did not know the attacker. so when the one person send an email to other people the attack in between read and then edit the mail to according to it and put a link in that by if the second user clicks on that link the attack will get all the details of the account of the user and the user will not know about it. This is said to be the man in the middle attack.
One attack that can be done by the person who you know like your friend and college or school classmates. When you choose a security question always choose the answer which is unique and none of the other people know the answer to that question because the other person will know the answer to that question then he can easily change your current password without you been informed.
Now let us understand the most important concept is that when you know that you have been attacked what to do in that case. Firstly and the most important things is that change your password right that point of time so if the attacker gets to know the last password it won't get the new password. So now these are some of the more methods by which you can get save form being attacked and these points can also help at the point when you are being attacked. so, in general, remember these points to not get attacked by anyone:
please upvote and raise your doubts within the comment.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.