CHAPTER 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

TOR is __________

"The Onion Router." It encapsulates packets (encrypts them) and sends them through various nodes. Each node the data travels through only sees enough information in the packet to send the data to the next node. As the data travels from node to node, it peels off a layer to maintain anonymity.

Mbox

A method of storing e-mail messages in a flat plaintext file.

Cient/Server Architecture

A network architecture in which each computer or process on the network is a client or server. Clients request services from a server, and a server processes requests from clients.

Simple Mail Transfer Protocol (SMTP)

A protocol for sending e-mail messages from an e-mail server

Multipurpose Internet Mail Extensions (MIME)

A specification for formatting non-ASCII messages, such as graphics, audio, and video, for transmission over the Internet

Online Social Networks (OSNs)

A term researchers use for social media

Pharming

A type of e-mail scam that uses DNS poisoning to redirect readers to a fake Web site.

Phishing

A type of e-mail scam that's typically sent as spam soliciting personal identity information that fraudsters can use for identity theft.

What Is My IP (website)

A way to determine what the IP of your machine is. Also includes your physical location.

Everything __________ the A belongs to the domain name

After

Enhanced/Extended Simple Mail Transfer Protocol (ESMTP)

An enhancement of SMTP for sending and receiving e-mail messages. ESMTP generates a unique, non-repeatable number that's added to a transmitted e-mail. No two messages transmitted from an e-mail server have the same ESMTP value. See also Simple Mail Transfer Protocol (SMTP).

Many companies are migrating their email servers to the __________

Cloud

Tracing __________ e-mails is easier because accounts use standard names the administrator establishes

Corporate

Types of e-mail naming conventions

Corporate and public

Parts in an e-mail client/server architecture

E-mail client E-mail server End device (desktop, laptop, smart phone, tablet)

The issue with TOR

End nodes; who is capturing your data and can they see what it is?

Types of OSNs

Facebook, Twitter, SnapChat, LinkedIn, Instagram

Domain Name Server (DNS) purpose

It resolves names to IPs For example: www.google.com is resolved to 8.8.8.8

About Cryptocurrency

Not centrally controlled, value relies on supply and demand (availabilty), not impacted by inflation like common currency (cash)

Stored Communications Act (SCA)

Part of the Electronic Communications Privacy Act that extends to the privacy of stored communications, such as e-mail.

Function of the "E-mail Sever" in an e-mail client/server architecture

Run programs such as Exchange Sever and Sendmail

Function of the "E-mail Client" in an e-mail client/server architecture

Run programs such as Microsoft Outlook and Evolution

www.internic.com (how it's used)

To find a domain's IP address and point of contact.

www.google.com (how it's used)

To look for more information and additional postings on discussion boards.

www.arin.net (how it's used)

To map an IP address to a domain name and find the domain's point of contact.

Spoofing

Transmitting an e-mail message with its header information altered so that its point of origin appears to be from a different sender; typically used in phishing and spamming to hide the sender's identity.

Protected accounts require __________

Usernames and passwords

What can go wrong with Cryptocurrency?

Value Can swing wildly, it's not accepted by all entities, the security of the system has not yet been completely proven

Internet Lookup Tools for Tracing E-Mail(s)

www.arin.net www.internic.com www.google.com


Set pelajaran terkait

EAQ- Perry Peds CH.34, The School-Age and Family

View Set

Essential Elements of a Valid Contract

View Set

Economics Review (Chapter 12) - Money Growth and Inflation

View Set