1. Targeted Email Attacks
1.1 What is Targeted Email?
1.2 Types of Targeted Email Attacks
1.2.1 Spam Emails
1.2.2 Malware
1.2.3 Social Engineering
1.2.4 Outbound Emails2. Security Requirements for Countering Targeted Email Attacks
2.1 Common Security Requirements for Targeted Email Attacks
2.2 Security Requirements for Spam Email Attacks
2.3 Security Requirements for Malware Attacks
2.4 Security Requirements for Social Engineering Attacks
2.5 Security Requirements for Outbound Email Attacks3.A Research on Targeted Email Attack Methods (White-Hat Hacking)
3.A.1 Common Aspects of Targeted Email Attacks
3.A.2 Methods to Counteract Spam Email Attacks
3.A.3 Methods to Counteract Malware Attacks
3.A.4 Methods to Counteract Social Engineering Attacks
3.A.5 Methods to Counteract Outbound Email Attacks
3.B Email Security Diagnosis Consulting
3.B.1 Threat Levels Based on Email Security Diagnosis
3.B.2 Methods for Email Security Consulting
3.B.3 How to Write an Email Security Diagnosis POC Report
3.B.4 UI Design and Data Matching Methods for Email Security Diagnosis Report3.C Email Security Monitoring and Control
3.C.1 What is Email Security Monitoring and Control?
3.C.2 Importance and Objectives of Email Security Monitoring and Control
3.C.3 Workflow Processes
3.C.4 Components