CHAPTER 11
TOR is __________
"The Onion Router." It encapsulates packets (encrypts them) and sends them through various nodes. Each node the data travels through only sees enough information in the packet to send the data to the next node. As the data travels from node to node, it peels off a layer to maintain anonymity.
Mbox
A method of storing e-mail messages in a flat plaintext file.
Cient/Server Architecture
A network architecture in which each computer or process on the network is a client or server. Clients request services from a server, and a server processes requests from clients.
Simple Mail Transfer Protocol (SMTP)
A protocol for sending e-mail messages from an e-mail server
Multipurpose Internet Mail Extensions (MIME)
A specification for formatting non-ASCII messages, such as graphics, audio, and video, for transmission over the Internet
Online Social Networks (OSNs)
A term researchers use for social media
Pharming
A type of e-mail scam that uses DNS poisoning to redirect readers to a fake Web site.
Phishing
A type of e-mail scam that's typically sent as spam soliciting personal identity information that fraudsters can use for identity theft.
What Is My IP (website)
A way to determine what the IP of your machine is. Also includes your physical location.
Everything __________ the A belongs to the domain name
After
Enhanced/Extended Simple Mail Transfer Protocol (ESMTP)
An enhancement of SMTP for sending and receiving e-mail messages. ESMTP generates a unique, non-repeatable number that's added to a transmitted e-mail. No two messages transmitted from an e-mail server have the same ESMTP value. See also Simple Mail Transfer Protocol (SMTP).
Many companies are migrating their email servers to the __________
Cloud
Tracing __________ e-mails is easier because accounts use standard names the administrator establishes
Corporate
Types of e-mail naming conventions
Corporate and public
Parts in an e-mail client/server architecture
E-mail client E-mail server End device (desktop, laptop, smart phone, tablet)
The issue with TOR
End nodes; who is capturing your data and can they see what it is?
Types of OSNs
Facebook, Twitter, SnapChat, LinkedIn, Instagram
Domain Name Server (DNS) purpose
It resolves names to IPs For example: www.google.com is resolved to 8.8.8.8
About Cryptocurrency
Not centrally controlled, value relies on supply and demand (availabilty), not impacted by inflation like common currency (cash)
Stored Communications Act (SCA)
Part of the Electronic Communications Privacy Act that extends to the privacy of stored communications, such as e-mail.
Function of the "E-mail Sever" in an e-mail client/server architecture
Run programs such as Exchange Sever and Sendmail
Function of the "E-mail Client" in an e-mail client/server architecture
Run programs such as Microsoft Outlook and Evolution
www.internic.com (how it's used)
To find a domain's IP address and point of contact.
www.google.com (how it's used)
To look for more information and additional postings on discussion boards.
www.arin.net (how it's used)
To map an IP address to a domain name and find the domain's point of contact.
Spoofing
Transmitting an e-mail message with its header information altered so that its point of origin appears to be from a different sender; typically used in phishing and spamming to hide the sender's identity.
Protected accounts require __________
Usernames and passwords
What can go wrong with Cryptocurrency?
Value Can swing wildly, it's not accepted by all entities, the security of the system has not yet been completely proven
Internet Lookup Tools for Tracing E-Mail(s)
www.arin.net www.internic.com www.google.com