Comprehensive Guide to Different Types of Attacks on Email Systems

Authors

  • Sumit Malik P.G. Student, Department of CSE, Sat Kabir Institute of Technology and Management, Haryana, India
  • Meenakshi Arora Assistant Professor, Department of CSE, Sat Kabir Institute of Technology and Management, Haryana, India
  • Rohini Sharma Assistant Professor and Corresponding Author, GPGCW, Rohtak

Keywords:

denial of service (DoS) attacks, email spoofing, Spam Mail

Abstract

Email systems are critical to modern communication but are increasingly targeted by cyberattacks due to the sensitive information they handle. This comprehensive guide explores the various types of attacks on email systems, including phishing, spear phishing, whaling, business email compromise (BEC), email spoofing, malware delivery, and spamming. It also delves into more sophisticated techniques like man-in-the-middle (MitM) attacks, credential harvesting, ransomware, impersonation attacks, denial of service (DoS) attacks, and email account compromise. By examining the methods and impacts of these attacks, this guide aims to enhance awareness and preparedness against potential threats. Furthermore, it outlines preventive measures, such as using strong passwords, enabling two-factor authentication (2FA), implementing email filtering, educating users, employing encryption, updating software, and monitoring email activity. Through understanding and mitigating these threats, individuals and organizations can better protect their email systems and sensitive information from cybercriminal activities.

Downloads

Published

2024-06-19

How to Cite

Malik, S., Arora, M., & Sharma, R. (2024). Comprehensive Guide to Different Types of Attacks on Email Systems. Information Horizons: American Journal of Library and Information Science Innovation (2993-2777), 2(6), 64–73. Retrieved from http://grnjournal.us/index.php/AJLISI/article/view/5216