Term Paper on "Corporate Email Security"
Term Paper 3 pages (1121 words) Sources: 1+
[EXCERPT] . . . .
Corporate Email SecurityPoor Email Security and Its Impact to Business Operation
Today's high technology still doesn't make us free from threats that can cause damage to important information. This is especially true to many businesses. A large percentage of information problems in businesses take place in email because of the poor email security that some companies implement in their organization.
As indicated by the article "Stop Email Fraud Before It Stops You,"
According to an April 2004 from Gartner Group, an estimated 57 million Americans think that they have received a phishing email. And the problem is growing. A study by the Anti-Phishing Working Group showed that between November 2003 and April 2004, phishing emails -- the most common type of fraudulent email-increased 110% each month. With the average successful fraud netting $1,400, consumer email fraud is already a $5 billion industry."
Thus, problems like email spams that do not only eat up storage spaces in servers but also brings other problems like virus and spywares puts into risk the confidentiality and integrity of the organization's diverse information.
The impact of poor email security to a business ranges from slight to severe problems. Slight problems include the usage of email server's storage space, interference to a smooth business continuity and operation due to email frauds, and traffic over email networks. But for the severe problem, which is always the concern about lack of email security, is the possibility of devastating the security and integrity of sensitive information that, if attacked, may cause s
download full paper ⤓
Organizations that are engaged in financial services, health care, and insurance, are usually the target of cyber-attackers by taking advantage of email security's vulnerabilities. A lot of events that happened in many parts of the globe, such as in banks and other financial institutions, have proven that the stability of a business can be threatened because of problems that were caused by poor email security. One of which is the spread of the "love virus" which was transported via email and had impede a lot of business operations.
Best Practices, Tools, and Methods to Ensure Email Security
The article "Stop Email Fraud Before It Stops You" has identified significant information regarding the problems and solutions to email security problems. It was suggested that a combination of tools and best techniques creates an effective method to combat email security problems such as frauds. Following are the four suggested steps as indicated in the article.
Detect. Use analysis techniques specifically designed to detect fraud.
There are many anti-spam softwares but not all can detect which are really fraudulent emails because some tend to look similar to the elements of real emails such as the email address. Important things to consider to assess the integrity of emails are the content, format, and sources.
Protect. Develop Containment and Control Protocols Specifically for Fraudulent Emails
In this method, emails are categorized whether they are spams or frauds. Because fraudulent emails are actually not spams, a certain method of segregating one from the other must be used to allow the users, specifically the authorized administrators, consider which is a spam and which is a fraud. In this way, future emails can be filtered… READ MORE
Quoted Instructions for "Corporate Email Security" Assignment:
Article on the lack of security, confidentiality, integrity and availability of corporate email (e.g., Microsoft Exchange or others). With specific, public domain examples of the impact of poor email security. Problems include the amount of non-business usage of corp email and non-business spam, spyware and virus traffic over email systems/networks. Email administrators within companies have the ability and access to inappropriately read and send emails. www.internalmemos.com is an example of risk. The article should highlight other examples.
The article should identify key best practices, tools and methods to insure email security.
Answer the question why corporate customers should consider outsourcing their email just like companies outsource their payroll to places like ADP or Ceridian, etc.
Outsourced email providers don't care about reading the content of email jut like ADP payroll processors don't care about reading paychecks or ACH receipts to see how much money someone makes, etc.
Aricle should have 2-3 related quotes and 3-4 specific examples of poor email security of particular US corporate organizations.
How to Reference "Corporate Email Security" Term Paper in a Bibliography
“Corporate Email Security.” A1-TermPaper.com, 2005, https://www.a1-termpaper.com/topics/essay/corporate-email-security-poor/936755. Accessed 1 Jul 2024.
Related Term Papers:
Techniques of Computer Forensics for Preventing Email Phishing Capstone Project
Computer Forensics for Preventing Email Phishing
It is no secret that white-collar crime has experienced rapid growth since the advent of the Internet. Reports state that white-collar crime costs average… read more
Capstone Project 17 pages (4655 words) Sources: 10 Topic: Computers / IT / Internet
Security Issues of Online Communities Term Paper
Security Issues of Online Communities
Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials.… read more
Term Paper 60 pages (15576 words) Sources: 1+ Topic: Computers / IT / Internet
Security - Agip Kazakhstan North Caspian Operating Term Paper
Security - Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO)
Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO) is the single operator of the North Caspian Sea Production… read more
Term Paper 35 pages (14948 words) Sources: 1+ Topic: Business / Corporations / E-commerce
Security Policy Dr. Fossett's Dental Office Term Paper
Security Policy of a Dental Office
Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the… read more
Term Paper 3 pages (1254 words) Sources: 0 Topic: Computers / IT / Internet
Information Technology (IT) Security Implementation Research Proposal
it Security Plan & Implementation
IT Security Plan and Implementation for a Small Corporation
IT Security Proposal Summary
Small corporations often have to deal with many conflicting it and often… read more
Research Proposal 16 pages (5733 words) Sources: 5 Topic: Computers / IT / Internet
Mon, Jul 1, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!