CH. 16
what is one of the biggest reason spam is prevalent today?
Criminals use zombie botnets
what is grey-listing?
E-mail messages are temporarily rejected so that the sender is forced to resend.
A(n)___ is a false email that tells a compelling story, and typically prompts the user to forward it to other users.
Email Hoax
if they are both text protocols, why is instant messaging traffic riskier than email?
IM traffic has to travel outside of the organisation to a server
_________can have the same virus risks as email
Instant messaging
why is HTML email dangerous?
It can allow launching of malicious code from the preview pane.
A(n) ____ is a complication of servers that are blocked because they have been known to send spam
Real time Blackhole list(RBL)
_______is a protocol for verifying email addresses against IP addresses to reduce spa
Sender IF Framework
why do PGP and S/MIME need public key cryptography?
The public key is necessary to encrypt the symmetric key.
What makes email hoaxes popular enough to keep the same story floating around for years?
The story prompts action on the reader's part.
why are instant messaging protocols dangerous for file transfer?
They bypass server-based virus protections.
what is spam?
Unsolicited commercial e-mail
Email encryption is
a great way to protect the privacy of communication since email is a cleartext medium
Open relay
a mail server that receives and forwards mail from outside sources
Pretty Good Privacy (PGP)
a popular encryption program that has the ability to encrypt and digitally sign email and files
AOL Instant Messenger (AIM)
a program conceived as a way to find people of like interests online, and it was modeled after earlier chat programs
Multipurpose Internet Mail Extensions (MIME)
a standard that describes how to encode and attach non-textual elements in an email
Real-time Blackhole List (RBL)
a system that uses DNS information to detect and dump spam emails
Botnet
a term for a collection of software robots, or bots, that runs autonomously and automatically and commonly invisibly in the background. The term is most often associated with malicious software, but it can also refer to the network of computers using distributed computing software
Instant messaging (IM)
a text-based method of communicating over the internet
Sender Policy Framework (SPF)
an email verification system designed to detect spoofed email addresses
Sender ID Framework (SIDF)
another server-based solution to spam offered by Microsoft
A large source of spam is zombie computers that are part of a(n)____
botnet
Use client-side antivirus programs to
catch any viruses that might come from web based email accounts
Malicious code is
code that performs something harmful to the computer it runs on. Malicious code is often sent through email
Trojan programs
deceive the user into thinking that a program is something innocuous, when it is actually a piece of malicious code
AOL Instant Messenger, ICQ, and Skype are all
different versions of instant messaging programs
______ is a method to detect email spoofing
domain key identified mail
To protect your email
don't execut any attachment from an unknown source
Spam
email that is not requested by the recipient and is typically of a commercial nature. Also known as unsolicited commercial email
Spam, or unsolicited commercial email is
email that is sent to you without your requesting it, attempting to sell you something. It is the electronic equivalent of a telemarketing call
Antivirus software is
important to protect against malware
E-mail hoax
internet-based urban legends that are spread through email, with users forwarding them in seemingly endless loops around the globe
Viruses are
pieces of malicious code that require user action to spread
Worms are
pieces of malicious code that use automated methods to spread
Keeping all software up to date helps
prevent worm propagation
Use antivirus programs that
run on the server to filter all emails
The most popular IM programs all
send messages in the clear, without native encryption built into the default clients
Mail relaying
sending an email from a separate ip address, making it more difficult for the mail to be traced back to you
started with mailbox programs on early time-sharing machines, allowing researchers to leave messages for others using the same machine. Current email in its use is still a simple way to send a relatively short text message to another user
Mail user agent (MUA)
the application on the servers machine
S/MIME, or Secure/Multipurpose Internet Mail Extension is
the email protocol that allows encryption applications to work
Mail transfer agent (MTA)
the mail server
Spam is the popular term for
unsolicited commercial email
Mail delivery agent (MDA)
what the recipients mail server is referred to
______ is one of the most popular chat programs
AOL instant Messenger(AIM)
why is an open email relay bad?
It will allow anyone to send spam through the server.
What makes spam so popular as an advertising medium?
Its low cost per impression
The most prevalent protocol that email is sent by is
Simple mail Transfer Protocol(SMTP)
DomainKeys Identified Mail (DKIM)
an authentication system for email designed to detect spoofing of email addresses
Secure/Multipurpose Internet Mail Extentions (S/MIME)
an encrypted implementation of the MIME protocol specification
All the IM clients need to
attach to a server to communicate. Therefore, when attached to the server, they announce the source IP of a particular user
Hoax emails are
emails that travel from user to user because of the compelling story contained in them
PGP, or Pretty Good Privacy
is a good specific application for email encryptioin
Server-side filtering software and the application of spam blackhole lists help
limit the amount of unsolicited email
Unsolicited commercial e-mail
mail whose purpose is the same as spam
_____is the protocol used to attach attachments to an email
multipurpose internet mail extension(MIME)
Encryption
the reversible process of rendering data unreachable through the use of an algorithm and a key
Simple Mail Transfer Protocol (SMTP)
the standard internet protocol used to transfer email between hosts
Instant messaging can also
transfer files. This activity typically bypasses any security built into the network, especially mail server virus protections