Risks to user
Precautions while using Securing Email
Risks to user
Email is vulnerable to both passive and active attacks. Passive threats include Release of message contents, and traffic analysis while active threats include Modification of message contents, Masquerade, Replay, and denial of service attack.
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/46.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/25.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/6.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/15.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/37.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/53.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/56.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/22.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/18.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/31.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/4.jpg)
![](../../appcode/show_img_th.php?fn=../appimg/Precautions-while-using-Securing-Email/24.jpg)
More ...
![](/images/ex_48.png)
![](/images/noicon.png)
![](/images/NYFI_48.png)
![](/images/noicon.png)
![](/images/LifeSecrets_48.png)
![](/images/noicon.png)
![](/images/Tomatoes_48.png)
![](/images/noicon.png)
![](/images/Antioxidant-rich-foods_48.png)
![](/images/HillStation_48.png)
![](/images/BOAv_48.png)
![](/images/noicon.png)
![](/images/noicon.png)
![](/images/BParks_48.png)
![](/images/Mangosteen_48.png)
![](/images/XmasDIdeas_48.png)
![](/images/noicon.png)
![](/images/LuxuryCars_48.png)
![](/images/NewCars_48.png)