Free

E-mail and social media investigations - Article Example

Comments (0) Cite this document
Summary
Numerous ways are used to obtain the information fraudulently such as through scam emails that lure individuals into communication that leads to obtaining sensitive information…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
E-mail and social media investigations
Read TextPreview

Extract of sample "E-mail and social media investigations"

E-mail and social media investigations E-mail and social media investigation Question Phishing involves a criminal activity that aims at gaining sensitive information in a fraudulent way. Numerous ways are used to obtain the information fraudulently such as through scam emails that lure individuals into communication that leads to obtaining sensitive information such as an individual’s credit card information, driver’s license and even one’s social security details (Van, 2013). Spear phishing is an email scam that has the aim of obtaining access to sensitive information to a specific group or organization through trusted e-mails unlike phishing. Pharming involves a hacker installing a spiteful code on a private computer or one’s server that later redirects to a webpage that was not expected and smishing involves the use of text messages to entice customers (Van, 2013).
Question 2
The advantages of circular logging is that it helps provide recovery from any transaction failure or any form of system crash through that may occur (Van, 2013). The logs are retained until the integrity of the current transactions is ensured. The disadvantage, however, is that it is difficult to restore the database and roll it forward in case a failure occurs.
Question 3
When investigating an e-mail abuse, one needs to detect how the server registers and handles the email upon receiving it. This is because the e-mail can either in the form of a flat file or the users’ e-mail (Van, 2013).
Question 4
The information available on social media may be used in investigation, since social media acts a snitch (Van, 2013). The information can be used through scrolling through the current updates and the feeds that the site might have. This means that the sites can be used as crime detection partners through provision of evidence. Proof of integrity and validity can be accessed through finding the origin of the report and the reporters of the same (Van, 2013).
Reference
Van, N. (2013). Attribution of Spear Phishing Attacks: A Literature Survey. NY: PN Publishers. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“E-mail and social media investigations Article Example | Topics and Well Written Essays - 250 words”, n.d.)
E-mail and social media investigations Article Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1691711-e-mail-and-social-media-investigations
(E-Mail and Social Media Investigations Article Example | Topics and Well Written Essays - 250 Words)
E-Mail and Social Media Investigations Article Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1691711-e-mail-and-social-media-investigations.
“E-Mail and Social Media Investigations Article Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1691711-e-mail-and-social-media-investigations.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF E-mail and social media investigations

E-mail protocol

...by the protocol from ever denying having received or sent the message. iii. The protocol ensures that only the intended message is sent. E-mail Protocol Abstract The issue of security can never be overlooked in this digital age when it comes to corporate emails. A simple leakage of confidential information can create a huge social, economical and political scene that can be costly in terms of money. Therefore, the need to add value to delivery of important data over the internet to safeguard individual and corporate interests cannot be overemphasized. To guarantee delivery of email messages, it would be paramount to consider using certified mail and lay down stringent...
10 Pages(2500 words)Research Paper

E-mail

...of the mail box to the parents, it is preventing a possible greatest harm to its greatest number of users. But, the possible greatest harm indicates a hypothetical tendency and the principles of negative utilitarianism can never be applied in this context as it is not a certainty that providing access of the e-mail would harm interests of the Yahoo's users. Keeping that aside, if one goes 3 by the pure principles of natural justice and social ethics, it is strictly an individual case , not related to the other users of the Yahoo e-mail service and should be considered as such strictly. It is no surprise that the Yahoo's denial draws...
3 Pages(750 words)Essay

E-mail Communication

...What do you see as the key points for communicating successfully through e-mail Registration Number Module Number and of Assignment Date of Submission The use of electronic mail or e-mail in organizations has become a necessity for communicating with internal or external parties. However, it is also necessary to educate users about the do's and don'ts of e-mail correspondence. There are several e-mail etiquettes that users must be aware of in order to effectively use the function. Since e-mail communications do not require face-to-face conversations,...
1 Pages(250 words)Essay

E-Mail Upgrade Project

...E-Mail Upgrade Project 1.0 Overview The Ohio Department of Human Services (ODHS) needed to upgrade its existing e-mail software. ODHS was using Version 7.0 of an e-mail software called Globalupgrades (a Worldviewupgrades product). The version’s support would have been phased out in another one year. ODHS evaluated several upgrade options to its existing e-mail software provided by different vendors, and finally selected Worldview Glocalcom product. The upgrade project was completed in 10 months as against a planned schedule of 9 months. Though there was a cost overrun, the upgrade project met the...
6 Pages(1500 words)Essay

E-mail spams

...of information dissemination and communication at social level at a rate beyond original predictions. However, the inherent drawback of the technological revolution is the ease and low cost of information dissemination, coupled with the shield of anonymity, rendering protection against spam increasingly problematic (Ian Lloyd, 2004). If we consider enforcement procedures under the Act, the Department of Internal Affairs is responsible for enforcement by the following methods: 1) Investigating complaints regarding spam; 2) Acting against “spammers” who are deliberately flouting the law. 3) Undertaking research into technologies used to send spam; 4) Liaising with relevant overseas bodies to ensure...
2 Pages(500 words)Essay

Love E-mail

...Dear Stefan, I am sending you some photos from our wedding. I am glad to say that we all looked perfect and the weather was brilliant that day. Thanks for coming. By the way, do you remember me asking a favor last time regarding the interview I need to do about your job and hotel? My assignment is to find a company with three or more nationals working together. The focus of my assignment is to find out the cross-cultural communication issues in a company and how the problems are being resolved. Now isn’t it that you work in Dusit Thani hotel in Phuket, Thailand? We all love this hotel, and from outside view of a customer or guest your hotel provides best service around the island. As you have worked in the hotel business... Stefan, I am...
1 Pages(250 words)Essay

E mail response

... Dear Dr. Sally smith, Re: Response regarding complaints and plans underway in the absence of Prof. Doe. It is unfortunate many students have misunderstood my strict guidelines and failed to raise the matter with me, so that, we may reach a satisfactory conclusion. Strict guidelines especially declining to offer makeup quizzes was to shun students’ laxity, whereby some evade classes faking they were ailing or giving lame excuses. Hence, take advantage of the tutors’ kindness. However, I have always been fair to students once they express the need for permission due to unavoidable circumstances in their lives, for instance, illness besides others. Similar to Prof. Doe’s policy, the issuance of instructional handouts takes place... Dear Dr....
1 Pages(250 words)Essay

Sales E-mail

...Sales E-Mail To……………………………………. cc……………………………………... bbc……………………………………. Dear Sir, It was nice communicating to you last week and talking about the sales representative issues in a financial organization, and thank you for introducing me to the sales manager Mr. Daniel. I am happy that I had a chance to talk to you concerning the exemplary sales experiences that I have and hope that I would be an asset of importance to your company. Though you mentioned about working as a team in the meeting, my area of expertise is in individual sales. Even though, I am ready to learn and adapt to team working, I can as well work with a collaborative and committed team that is ready to develop sales strategies and handle...
1 Pages(250 words)Essay

Computer Crimes and Digital Investigations

.... The issues of computer crime have become high-status, especially those involving identity stealing, hacking, copyright infringement from child pornography, and child grooming (Duggal, “CyberCrime”). Problems of privacy occur when personal and confidential information is either by intercepted or lost. Hence, cyber crime may be generally defined as: “unlawful acts wherein the computer is either a tool or target or both.” (Walden, 2007). The following unlawful activities are conducted using computer, for example cyber defamation, e-mail spoofing, pornography, forgery, financial crimes, intellectual property crime, sale of illegal articles, online gambling, and cyber stalking. The computer may also be the...
12 Pages(3000 words)Essay

Social Media Investigations

...Social Media Investigations Social Media Investigations Social media offers a diverse platform of interacting between members of thesociety on different classes. The social sites also offer a variety of online products depending on consumer needs. The social media platform forms a fundamental composition in the contemporary society for creating awareness, education and entertainment. The platform establishes basic technology edification for both educators and learners. Proffesor Semitsu offers an arguable proposition for a need to repair governmental...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic E-mail and social media investigations for FREE!

Contact Us