Volume 15, Number 6

A Framework for Securing Email Entrances and Mitigating Phishing Impersonation Attacks

  Authors

Wosah Peace Nmachi, University of Gloucestershire, United Kingdom

  Abstract

Emails are used every day for communication, and many countries and organisations mostly use email for official communications. It is highly valued and recognised for confidential conversations and transactions in day-to-day business. The Often use of this channel and the quality of information it carries attracted cyber attackers to it. There are many existing techniques to mitigate attacks on email, however, the systems are more focused on email content and behaviour and not securing entrances to email boxes, composition, and settings. This work intends to protect users' email composition and settings to prevent attackers from using an account when it gets hacked or hijacked and stop them from setting forwarding on the victim's email account to a different account which automatically stops the user from receiving emails. A secure code is applied to the composition send button to curtail insider impersonation attack. Also, to secure open applications on public and private devices.

  Keywords

Email Users, phishing attack, impersonation, mitigation, and security.