Chapter 10. Investigating and Scrutinizing E-mail

E-MAIL IS THE ELECTRONIC EQUIVALENT of a letter or a memo. Computers and servers retain these electronic messages in digital format. An e-mail may include attachments or enclosures. And organizations and individuals use e-mail for communicating sensitive, protected, or confidential information. E-mail is also a very common method for distributing intellectual property, such as client lists or copyrighted material. You may send one with desktop and laptop computers and other portable devices, such as mobile phones and personal digital assistants (PDAs).

E-mail creates a security vulnerability. It is a virtual door that leads directly into a network and indirectly into every desktop. In its natural ...

Get System Forensics, Investigation, and Response now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.