Forensic mail network were based more on the e-mail message structure, whereas email content was rarely used. In different security extension schemes, cyber criminals tend to make use of email protocols by multiple producers over the course of a year for illegal purposes, for example send emails have become the most important digital platform for communication, file transfer and transactions and use not only laptops but also many other electronic gadgets including mobile phones.In this context, a number of forensics open source resources were frequently used by professionals. Furthermore, the misuse of Internet infrastructure by denial of service, storage waste and computer resources costs every internet user directly or indirectly. E-mail forensic is used to the origin and the content of e-mail as evidence, to determine the actual sender, the recipient, and when and how it was sent, etc. These instruments were nevertheless developed in isolation rather than in cooperation. Since forensic email users have to know the utility of a method for forensics research in their own situations. This paper is intended to illustrate the email system architecture from a forensic perspective. It describes the email partners ' roles and responsibilities, the metadata in the email headers
CITATION STYLE
gupta*, Mr. S., R, Mr. Anand., & G. N, Dr. A. (2020). Forensic Technical Process by E-Mail. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 4225–4228. https://doi.org/10.35940/ijrte.e6644.018520
Mendeley helps you to discover research relevant for your work.