E-mail security means a subset of data security that includes securing the privacy and accessibility of mail frameworks and the information they contain. It is practically equivalent to web security, which includes ensuring websites and the information they contain, but it centers on mail rather than websites. Like web security, e-mail security includes ensuring against both internal threats such as malicious representatives and outside threats, such as programmers and malware.
Types of Email Account Hacking:
- Social Engineering
- Brute Force Attack
- Guessing the Answer to the Security Question
Social engineering uses human weakness or psychology to gain access to the system, data, personal information, etc. It is the art of manipulating people. It doesn’t involve the use of technical hacking techniques. Attackers use new social engineering practices because it is usually easier to exploit the victim’s natural inclination to trust.
Please refer to the article: Social Engineering to read more about this topic.
Brute Force Attack:
A Brute force attack is a well-known breaking technique, by certain records, brute force attacks represented five percent of affirmed security ruptures. A brute force attack includes ‘speculating’ usernames and passwords to increase unapproved access to a framework.
Please refer to the article: Brute force attack to read more about this topic.
Key loggers also known as keystroke loggers, may be defined as the recording of the key pressed on a system and saved to a file, and that file is accessed by the person using this malware. Key loggers can be software or can be hardware.
Please refer to the article: Introduction to Keyloggers to read more about this topic.
Guessing the Answer to the Security Question:
The Security Question technique is a questionnaire that can be used to gather information about an individual’s computer security habits. This question also known as WHOIS look-up or NIC user query, helps hackers determine the answers to certain security questions related to the victim’s computer. By knowing these questions and answering them correctly, cybercriminals can gain access to victims’ personal information or online accounts.
Please Login to comment...