{"title":"电子邮件是一种攻击工具","authors":"Piotr Dela","doi":"10.5604/01.3001.0053.8017","DOIUrl":null,"url":null,"abstract":"The article focuses on the most important aspects of security threats resulting from the use ofelectronic mail. The essence of cyberspace has been identified as the environment whosesubstance is the production, transmission, storage and processing of information. The mostimportant examples of e-mail-related threats were presented in relation to social engineering as amethod of fraud aimed at obtaining unauthorised access to information necessary to commit acrime. Attention was also focused on how to counteract these types of threats effectively.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"E-MAIL AS AN ATTACK TOOL\",\"authors\":\"Piotr Dela\",\"doi\":\"10.5604/01.3001.0053.8017\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article focuses on the most important aspects of security threats resulting from the use ofelectronic mail. The essence of cyberspace has been identified as the environment whosesubstance is the production, transmission, storage and processing of information. The mostimportant examples of e-mail-related threats were presented in relation to social engineering as amethod of fraud aimed at obtaining unauthorised access to information necessary to commit acrime. Attention was also focused on how to counteract these types of threats effectively.\",\"PeriodicalId\":269616,\"journal\":{\"name\":\"Cybersecurity & Cybercrime\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity & Cybercrime\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5604/01.3001.0053.8017\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity & Cybercrime","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0053.8017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The article focuses on the most important aspects of security threats resulting from the use ofelectronic mail. The essence of cyberspace has been identified as the environment whosesubstance is the production, transmission, storage and processing of information. The mostimportant examples of e-mail-related threats were presented in relation to social engineering as amethod of fraud aimed at obtaining unauthorised access to information necessary to commit acrime. Attention was also focused on how to counteract these types of threats effectively.