O'Reilly logo

System Forensics, Investigation, and Response by K Rudolph, John R. Vacca

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Investigating and Scrutinizing E-mail

E-MAIL IS THE ELECTRONIC EQUIVALENT of a letter or a memo. Computers and servers retain these electronic messages in digital format. An e-mail may include attachments or enclosures. And organizations and individuals use e-mail for communicating sensitive, protected, or confidential information. E-mail is also a very common method for distributing intellectual property, such as client lists or copyrighted material. You may send one with desktop and laptop computers and other portable devices, such as mobile phones and personal digital assistants (PDAs).

E-mail creates a security vulnerability. It is a virtual door that leads directly into a network and indirectly into every desktop. In its natural ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required