Following the E-mail Trail

Nuñez, Ramon
October 2005
Security: Solutions for Enterprise Security Leaders;Oct2005, Vol. 42 Issue 10, p42
Trade Publication
Reports on the use of e-mail for identifying security breaches. Consideration of e-mail as a proverbial haystack in Internet Protocol fraud and security management; Ability of e-mail to be more revealing than traditional sources of information; Significance of e-mail analysis in uncovering fraud, protecting corporate image and deriving value from a natural data source.


Related Articles

  • Digital Shuffle. Gasulla, Sabrina // SDM: Security Distributing & Marketing;Mar2013, Vol. 43 Issue 3, p206 

    The article reviews several websites including the CEDIA consumer website, located at www.cedia.org., the Notifier alarm and emergency web platform, located at www.notifier.com, and the SentryNet's Web 2.0, located at www.sentrynet.com.

  • IP Cameras Will Change Your Life.  // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p62 

    The article discusses the use of Internet Protocol (IP) cameras in physical security in the United States. The challenge for enterprises seeking return on investment is determining how long it will take for IP cameras to dominate. As digital camera technology continues to improve, the cost...

  • Security Panel Seeks Input. Vaughan, Allyson // Wireless Week;4/8/2002, Vol. 8 Issue 14, p4 

    Reports on the e-mail address established by the U.S. Federal Communications Commission Homeland Security Policy Council to receive input on communications security issues, as of April 2002. Information on the council; Remarks from a council member.

  • Digital Shuffle. Shein, Maggie McFadden // SDM: Security Distributing & Marketing;Jun2014, Vol. 44 Issue 6, p140 

    The article reviews several web sites on security management including Silent Knight's website at www.silentknight.com, Electronic Security Association's (ESA) website at www.alarm.org, and DVTel Inc.'s website at www.dvtel.com.

  • The 'Soft' Side of Security. Freschi, Cynthia // SDM: Security Distributing & Marketing;Dec2005, Vol. 35 Issue 12, p106 

    This article presents information on the security industry. The author observes that the very nature of new system product introductions have changed enormously over a very short time span. The systems are moving towards a more software-centric solution. The author discusses the factors...

  • Spam volume could double in 2008.  // Communications News;May2008, Vol. 45 Issue 5, p8 

    The article reports on the increasing volume of enterprise spam in the U.S. According to Proofpoint, the spam in the enterprise network industry has increased by more than 50% which accompanied by the short-term spikes of 60%. The observation of the unified electronic mail security and data loss...

  • Assessing drivers for organizational commitment towards the security controls implementation in the Malaysian online service in computer-based accounting system. Mohamed, Intan Salwani; Ussna Ridzwan, Izzatul; Mohd Daud, Norzaidi; Baharin, Zakiah; Wan Ismail, Saidin // Advances in Natural & Applied Sciences;2012, Vol. 6 Issue 8, p1223 

    The objective of this study is to determine the accessing drivers for organizational commitment towards security controls implementation in the Malaysian online service in computer based accounting system. Based on survey, data was collected from 63 firms in hotel/resort, financial and...

  • Be Safe Out There–Some Basic Principles of Online Safety. Ferrara, Adi // AMWA Journal: American Medical Writers Association Journal;2012, Vol. 27 Issue 4, p180 

    The article discusses basic principles of safety on the Internet. It states that Malware is malicious software developed to digitally harm the computer and its user and includes keystroke loggers, worms, and Trojans. It says that e-mails and websites will automatically be scanned by a good...

  • Internet connections.  // Secretary;May97, Vol. 57 Issue 5, p5 

    Provides some helpful Web sites for those who want look for listings of electronic (E)-mail addresses, home page addresses and converting E-mail files to readable text and others.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics