1. NADAR SARASWATHI COLLEGE OF ARTS
AND SCIENCES, THENI.
ATTACKS POSSIBLE THROUGH EMAIL
ESTABLISHING KEYS PRIVACY
A.NAGA
VARTHINI
IMSC CS
2. Introduction:
Get to know various types of email attacks and learn how
to respond to them. We will present the latest security
measures to keep your inbox safe and private
3. This guide will present common cyber threats and help you
reevaluate your current email security standards
•The likelihood of email attacks and
their types
•End-to-end encryption as an email
security measure
•The role of email service
providers (ESPs) in your data
protection
4. Common email attack types every user should
know:
In most cases, cyber-attackers want sensitive data or
access to your online accounts. They can steal your identity
or sell your credentials to the highest bidder on the dark
web. Some hackers also use emails to enter an
organization’s servers, disrupt services, and cause
reputational damage.
5. On a macro level, email attacks typically fit one or more
of these five types:
1.Phishing
2.Malware
3.Man-in-the-middle attack
4.Denial of service
5.Account takeover
6. Skiff’s email attack resistance
Skiff is an open-source service, and the public can check how
its security features are implemented. Besides the
transparency, Skiff offers enhanced resistance against
advanced attacks like:
Phishing and malware
Impersonation and identity theft
MITM attacks
Account takeover attacks
Username enumeration
De-anonymization
Brute force and dictionary attacks
7. Skiff implements advanced end-to-end encryption for a
fast and efficient security setup. You can go through
the public whitepaper to learn more about the
platform’s security model and system design