CH. 16

¡Supera tus tareas y exámenes ahora con Quizwiz!

what is one of the biggest reason spam is prevalent today?

Criminals use zombie botnets

what is grey-listing?

E-mail messages are temporarily rejected so that the sender is forced to resend.

A(n)___ is a false email that tells a compelling story, and typically prompts the user to forward it to other users.

Email Hoax

if they are both text protocols, why is instant messaging traffic riskier than email?

IM traffic has to travel outside of the organisation to a server

_________can have the same virus risks as email

Instant messaging

why is HTML email dangerous?

It can allow launching of malicious code from the preview pane.

A(n) ____ is a complication of servers that are blocked because they have been known to send spam

Real time Blackhole list(RBL)

_______is a protocol for verifying email addresses against IP addresses to reduce spa

Sender IF Framework

why do PGP and S/MIME need public key cryptography?

The public key is necessary to encrypt the symmetric key.

What makes email hoaxes popular enough to keep the same story floating around for years?

The story prompts action on the reader's part.

why are instant messaging protocols dangerous for file transfer?

They bypass server-based virus protections.

what is spam?

Unsolicited commercial e-mail

Email encryption is

a great way to protect the privacy of communication since email is a cleartext medium

Open relay

a mail server that receives and forwards mail from outside sources

Pretty Good Privacy (PGP)

a popular encryption program that has the ability to encrypt and digitally sign email and files

AOL Instant Messenger (AIM)

a program conceived as a way to find people of like interests online, and it was modeled after earlier chat programs

Multipurpose Internet Mail Extensions (MIME)

a standard that describes how to encode and attach non-textual elements in an email

Real-time Blackhole List (RBL)

a system that uses DNS information to detect and dump spam emails

Botnet

a term for a collection of software robots, or bots, that runs autonomously and automatically and commonly invisibly in the background. The term is most often associated with malicious software, but it can also refer to the network of computers using distributed computing software

Instant messaging (IM)

a text-based method of communicating over the internet

Sender Policy Framework (SPF)

an email verification system designed to detect spoofed email addresses

Sender ID Framework (SIDF)

another server-based solution to spam offered by Microsoft

A large source of spam is zombie computers that are part of a(n)____

botnet

Use client-side antivirus programs to

catch any viruses that might come from web based email accounts

Malicious code is

code that performs something harmful to the computer it runs on. Malicious code is often sent through email

Trojan programs

deceive the user into thinking that a program is something innocuous, when it is actually a piece of malicious code

AOL Instant Messenger, ICQ, and Skype are all

different versions of instant messaging programs

______ is a method to detect email spoofing

domain key identified mail

To protect your email

don't execut any attachment from an unknown source

Spam

email that is not requested by the recipient and is typically of a commercial nature. Also known as unsolicited commercial email

Spam, or unsolicited commercial email is

email that is sent to you without your requesting it, attempting to sell you something. It is the electronic equivalent of a telemarketing call

Antivirus software is

important to protect against malware

E-mail hoax

internet-based urban legends that are spread through email, with users forwarding them in seemingly endless loops around the globe

Viruses are

pieces of malicious code that require user action to spread

Worms are

pieces of malicious code that use automated methods to spread

Keeping all software up to date helps

prevent worm propagation

Use antivirus programs that

run on the server to filter all emails

The most popular IM programs all

send messages in the clear, without native encryption built into the default clients

Mail relaying

sending an email from a separate ip address, making it more difficult for the mail to be traced back to you

E-mail

started with mailbox programs on early time-sharing machines, allowing researchers to leave messages for others using the same machine. Current email in its use is still a simple way to send a relatively short text message to another user

Mail user agent (MUA)

the application on the servers machine

S/MIME, or Secure/Multipurpose Internet Mail Extension is

the email protocol that allows encryption applications to work

Mail transfer agent (MTA)

the mail server

Spam is the popular term for

unsolicited commercial email

Mail delivery agent (MDA)

what the recipients mail server is referred to

______ is one of the most popular chat programs

AOL instant Messenger(AIM)

why is an open email relay bad?

It will allow anyone to send spam through the server.

What makes spam so popular as an advertising medium?

Its low cost per impression

The most prevalent protocol that email is sent by is

Simple mail Transfer Protocol(SMTP)

DomainKeys Identified Mail (DKIM)

an authentication system for email designed to detect spoofing of email addresses

Secure/Multipurpose Internet Mail Extentions (S/MIME)

an encrypted implementation of the MIME protocol specification

All the IM clients need to

attach to a server to communicate. Therefore, when attached to the server, they announce the source IP of a particular user

Hoax emails are

emails that travel from user to user because of the compelling story contained in them

PGP, or Pretty Good Privacy

is a good specific application for email encryptioin

Server-side filtering software and the application of spam blackhole lists help

limit the amount of unsolicited email

Unsolicited commercial e-mail

mail whose purpose is the same as spam

_____is the protocol used to attach attachments to an email

multipurpose internet mail extension(MIME)

Encryption

the reversible process of rendering data unreachable through the use of an algorithm and a key

Simple Mail Transfer Protocol (SMTP)

the standard internet protocol used to transfer email between hosts

Instant messaging can also

transfer files. This activity typically bypasses any security built into the network, especially mail server virus protections


Conjuntos de estudio relacionados

Texas Govt. Exam 3 Review Questions Ch. 6,7

View Set

Cell Division in Eukaryotic Cells Quiz

View Set

Chapter 11 water and major minerals

View Set

NCLEX PRACTICE QUESTIONS-ONCOLOGY UNITY 1

View Set

Peds Musculoskeletal or Articular Dysfunction

View Set