• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

It's Your Problem Now

Although intercepting email messages in transit is a real risk, it does require the attacker to be in the right place at the right time. However, after your email program receives a message, another risk emerges that could persist for days, weeks, or even years. The message is stored in a file on your computer and typically isn't protected from being read outside the email program. If someone gains access to the files on your computer, all the email messages you have received can probably be read.

Case Study 8-5

Carmen's husband had gone golfing for the day. He had been acting strangely for the past few days, and Carmen was determined to find out what was up. She turned on his work laptop and started his email program. Although his email messages were sent encrypted over the Internet, after they were downloaded to his email program, they were available for reading.

She discovered that her husband's company was planning to relocate his division to Dallas. The idea of moving halfway across the country was upsetting, and Carmen wondered why her husband hadn't mentioned it. She decided to look further to see whether he was keeping any other secrets from her.



PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint