O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Recognizing and Administering Security Controls—Email Communications

Understand communication security in wireless, wired, and application-specific environments.

Email communication, according to some sources, dates back to 1971 when the first computer message was sent back in the ARPAnet days. Email has come a long way in the last 30 years or so, and it is really hard to think of any modern organization that does not depend on email on a daily basis. Furthermore, email proved to be the killer app in the 1990s, given human strivings to communicate. Not surprisingly, a vast majority of viruses arrive via email these days, and email has also been the subject of several privacy-related concerns.

Email threats can be categorized into the following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required