Affiliation:
1. Military Institute of Science and Technology (MIST), Bangladesh
Abstract
With the advancement of modern science and technology, data emerging from different fields are escalating gradually. Recently, with this huge amount of data, Big Data has become a source of immense opportunities for large scale organizations related to various business sectors as well as to information technology (IT) professionals. Hence, one of the biggest challenges of this context is the security of this big set of data in different ICT based organizations. The fundamental objective of this article is to explore how big data may create security challenges in email communication. As an outcome, this article first shows that big data analysis helps to understand the behavior or interest of email users, which in turn can help phishers to create the phishing sites or emails that result in IT security threat; second, the article finds that phishing e-mail generation based on the (email) users' behavior can break an organization's IT security; and finally, a framework was proposed that would help to enhance the security of email communication.
Reference54 articles.
1. Accountingverse. (2016), Types of businesses and forms of business organizations. Retrieved from http://www.accountingverse.com/accounting-basics/types-of-businesses.html
2. Acevado, L. (2018). The advantages of email in business communication. Chron. Retrieved from http://smallbusiness.chron.com/advantages-email-business-communication-122.html
3. Akalp, N. (2014). How to properly handle your company’s meeting minutes, in Startup. Small Business Trends. Retrieved from http://smallbiztrends.com/2014/09/what-are-meeting-minutes.html
4. Alam, S., Horspool, R. N., & Traore, I. (2014). MARD: A framework for metamorphic malware analysis and real-time detection. In 2014 proceedings of the international conference Advanced information networking and applications (AINA), Victoria, Canada. IEEE.
5. A framework for metamorphic malware analysis and real-time detection
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献