protocols. This allows for email to be easily spoofed, spammed,
flooded, eavesdropped on, interfered with, and hijacked. Defenses
against these issues primarily include having stronger
authentication requirements and using encryption to protect the
content while in transit.