Loading

Forensic Technical Process by E-Mail
Sudhanshu Gupta1, Anand. R2, Anil G.N3
1Mr.Sudhanshu gupta, BMS institute of technology and management, bengalurur, India.
2Mr. Anand. R, Assistant Professor BMS institute of technology and management, India.
3Dr. Anil G. N, Working as HOD and professor in computer science and engineering department BMS Institute of technology and management, bengaluru, Karnataka, India.

Manuscript received on January 05, 2020. | Revised Manuscript received on January 25, 2020. | Manuscript published on January 30, 2020. | PP: 4225-4228 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6644018520/2020©BEIESP | DOI: 10.35940/ijrte.E6644.018520

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Forensic mail network were based more on the e-mail message structure, whereas email content was rarely used. In different security extension schemes, cyber criminals tend to make use of email protocols by multiple producers over the course of a year for illegal purposes, for example send emails have become the most important digital platform for communication, file transfer and transactions and use not only laptops but also many other electronic gadgets including mobile phones.In this context, a number of forensics open source resources were frequently used by professionals. Furthermore, the misuse of Internet infrastructure by denial of service, storage waste and computer resources costs every internet user directly or indirectly. E-mail forensic is used to the origin and the content of e-mail as evidence, to determine the actual sender, the recipient, and when and how it was sent, etc. These instruments were nevertheless developed in isolation rather than in cooperation. Since forensic email users have to know the utility of a method for forensics research in their own situations. This paper is intended to illustrate the email system architecture from a forensic perspective. It describes the email partners ‘ roles and responsibilities, the metadata in the email headers.
Keywords: E-mail Forensics; E-mail Headers; Header; Architecture of E-mail.
Scope of the Article: Network Architectures.