Now Accepting Apple Pay

Apple Pay is the easiest and most secure way to pay on StudyMoose in Safari.

Two decades of internet technology

Over two decades of internet technology has blanketed every area of everyday life. Today it also includes the more “traditional” people who hammered, “I’ll never be able to understand how to use that contraption,” when personal computers first surfaced. These people still may not be able to surf the net effectively, or download documents, but one thing they are familiar with are emails. The list of personal, safe, informative messages, are just a click away from reading.

What these people don’t know may negatively affect their lives, with personal information floating around the world wide web.

Emails need to be secure and controlled

Computer savvy people, businesses, and government agencies know that in one click you could opening yourself up to a fraudulent email, with similar consequences as stealing your wallet, license, credit cards, etc. Sending and receiving email is like “sending a postcard through the Postal Mail service – anyone can read it (idcontrol.

Get quality help now
Writer Lyla
Verified writer

Proficient in: Computer security

5 (876)

“ Have been using her for a while and please believe when I tell you, she never fail. Thanks Writer Lyla you are indeed awesome ”

+84 relevant experts are online
Hire writer

net). Emails need to be secure and controlled, through authentication, encrypting and digital signatures. Methods used by Internet Service Providers (ISP), and third party companies automatically without the need for their customers to do anything different than a simple click, but with complete confidence that their identity is not being compromised. This research paper will explain Email authentication, vulnerabilities of internet communications, and steps being taken to reduce and ultimately stop fraudulent emails.

Email authentication

What is email authentication? According to Tara Natanson, Director of ISP Relations at Constant Contact, it is a method to verify “an email message actually came from where it says its fro.

Get to Know The Price Estimate For Your Paper
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Check writers' offers

You won’t be charged yet!

” The importance of email authentication cannot be overstated, With the billions of emails sent daily. The trust lost from countless fraudulent emails must be reverted to indemnify secure relations with customers.

Natanson also noted that there were more than 2.6 trillion emails in 2007, in the United States alone, depicting them as an extremely vital, “communication tool.” Authentication benefits Internet Service Providers, corporate domains and their clients. The companies depend on a progressive framework to determine whether the message is real or fraudulent, before forwarding it to their clients. The importance for marketing companies, to comply with authentication requirements, delves one step further; the need to be “recognized as legitimate,” is crucial.

ISP’s and corporate domains will not receive or send their emails, with marketing playing such a big role in fraudulent activities, purely from the profusion of emails generated (Keegan, n. d. ). An article from Biz Report, published on February 5, 2008 said that “more than half of email marketers are using authentication or certification programs to ensure that consumers know the messages are real. ” The marketing industry’s growth depends directly on consumers and obviously, if they’re reporting the emails as spam to their ISP’s, the emails are not being opened.

By promoting the security of authenticating they’re domain, “email marketers can prevent email spoofs from reaching consumers,” (Knight, n. d. ). Email authentication has to be taken seriously throughout the internet world, for it to be effectual, and unceasingly productive. In a very detailed article from Michael Kaplan at SpamFizzle. com each aspect of email authentication is discussed.

Cite this page

Email message. (2020, Jun 02). Retrieved from

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment