期刊文献+

浅析电子邮件的安全

A Brief Analysis on the E-mail Security
下载PDF
导出
摘要 电子邮件的应用使得人与人间的通讯变得快捷、方便,然而电子邮件的使用也带来网络安全的问题。攻击者可通过钓鱼邮件窃取用户信息,给个人和公司带来严重的经济损失。因此,保障电子邮件的安全非常重要。本文研究电子邮件存在的安全问题,并且给出对应的解决方案。 E-mail makes communication fast and convenient, but email also leads to the problem of network security.Attackers can steal users information through phishing e-mails, causing serious economic losses to individuals and companies. Therefore, it is very important to ensure e-mail security. This paper studies e-mail security and gives corresponding solutions.
作者 杨海明 YANG Haiming(China Mobile Communications Group Shanxi Co.,Ltd.,Taiyuan 030032)
出处 《办公自动化》 2022年第8期53-55,共3页 Office Informatization
关键词 电子邮件 网络安全 钓鱼攻击 E-mail network security phishing attack
  • 相关文献

参考文献3

二级参考文献11

  • 1CRANOR L,EGELMAN S,HONG J,et al. Phishing phish : An eval- uation of anti-phishing toolbars[ EB/OL]. http: //www. cylab. emu.edu/research/techreports/2006/tr_cylab06018. html.
  • 2COLLIN J,SIMON D R,TAN D S,et al. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks [ C] // Proceed- ings of Usable Security ( USEC , 07). 2007.
  • 3FETTE I, SADEH N,TOMASIC A. Learning to Detect PhishingEmails [ EB/OL]. http: // reports-archive. adm. cs. emu. edu/anon/isri2006/abstracts/06-112. html.
  • 4ABU-NIMEH S,NAPPA D,WANG X,et al. A Comparison of Ma-chine Learning Techniques for Phishing Detection[ C] //Proceedingsof the anti-phishing working groups 2nd annual eCrime researcherssummit. New York : ACM. 2007.
  • 5BERGHOLZ A,CHANG J H,PAAp G, et al. Improved PhishingDetection Using Model-based Features [ C] // Proceedings of theConference on Email and Anti-Spam (CEAS).2008.
  • 6BERGHOLZ A, PAAp G, REICHARTZ F, et al. Detecting Knownand New Salting Tricks in Unwanted Emails[ C] //Proceedings Con-ference on Email an AntiSpam ( CEAS ) . 2008.
  • 7ZHANG Y,HONG J, CRANOR L. CANTINA : A Content-Based Ap- proach to Detecting Phishing Web Sites [ C] // Proceedings of the 16th International Conference on World Wide Web. 2007.
  • 8BERGHOLZ A,BEER J D,GLAHN S,et al. New Filtering Approa- ches for Phishing Email [ J]. Journal of Computer Security, 2010, 18(1) :7 -35.
  • 9ALBRECHT K,BURRI N, WATTENHOFER R. Spamato—An Ex-tendable Spam Filter System [ C] //2nd Conference on Email andAnti-Spam ( CEAS). Palo Alto,California,USA,2005.
  • 10CHANDRASEKARAN M,KARAYANAN K,UPDAHYAYA S. To-wards phishing e-mail detection based on their structural properties[EB/OL]. http: // www. albany. edu/iasymposium/ proceedings/2006/ chandrasekaran. pdf.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部