Answered You can hire a professional tutor to get the answer.
Hi, I have assignment that need to be turn in APA format. This project related to Trustworthiness of an email system - Access control Need a research paper around 8-10 pages Trustworthiness of an emai
Hi,
I have assignment that need to be turn in APA format. This project related to Trustworthiness of an email system - Access control
Need a research paper around 8-10 pages
Trustworthiness of an email system
Hypothesis:
why effective are current email security measure to prevent email phishing?
why to reduce humans from becoming a victim of an phishing emails?
why email security not adequate sufficient to protect data ?
Implementing email security protocols and train your employees.
using password manager and multi factor authentication.
Summary:
With the growing incidents related to email phishing raises the question, how secure is the existing email system? Human factor plays a vital role of becoming a victim for these phishing emails. No matter how much security was added, errors made by humans will always be on top of this pyramid. In this paper, we are proposing of adding an additional tag like [EXTERNAL] to provide the trustworthiness of the email sender. As a human, we are more aligned on visual information and that is our main topic of discussion of this research paper. An email sender notoriety is a score that an Internet Service Provider (ISP) allocates to an association that sends the email, which plays as a vital segment of your email deliverability. The higher the score, the more probable an ISP will convey messages to the inboxes of beneficiaries on their system. On the off chance that the score falls underneath a specific limit, the ISP may send messages to beneficiaries' spam organizers or even reject them by and large. Considering this, we will write about trustworthiness of an email system which helps to reduce malicious attack.
Paper pattern:
Introduction
Paragraph 1 (6 sentences)
-Broad sentence on
-Access control – email security( broad definition to your paper)
Paragraph 2 (6 lines)
-In this research, the team is going to …………………………………..
Paragraph 3
Why are we doing this
-Business reason – security (email phishing)
Paragraph 4 (3 -4 sentences)
-What we are not going to cover
-Ex: limited to …..
Variables (1 line)
-Dependent variables – email phishing/trustworthiness
-Independent variables
Describe the rest of the body
Chapter 1
Chapter 2 Methodology
Chapter 3 conclusion
4 Literature review
Enforcement
Methodology
Conclusion