Chapter 4
Risks and Defenses in the Email System