The ____ protocol is used by an application to retrieve mail from a mail server.

Upgrade to remove ads

Show

    Only SGD 41.99/year

    1. Science
    2. Computer Science
    3. Computer Security and Reliability

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Terms in this set (25)

    Security of E-mail

    Originally launched unsecure; remains mostly unsecure.
    Encryption is possible, but not the norm
    Uses S/MIME or PGP

    -Internet e-mail depends on three primary protocols:
    SMTP
    POP3
    IMAP

    E-mail is used:

    -To spread viruses
    -To forward hoaxes
    -To phish
    -To scam (e.g., Nigerian Princess)
    -To spam

    Pretty Good Privacy (PGP)

    PGP implements e-mail security in a similar fashion to S/MIME, but uses completely different protocols.

    -The content is encrypted with the generated symmetric key, and that key is encrypted with the public key of the recipient of the e-mail for confidentiality.

    -PGP manages keys locally in its own software. It stores:
    Local keys
    User's public key
    User's private key
    Symmetric keys

    Malicious Code Protection Measures

    Antivirus
    E-mail scan
    Disable
    Preview panes
    Scripting support
    Follow safe practices and procedures
    Educate employees

    Hoax E-mails

    E-mail hoaxes are mostly a nuisance, wasting everyone's time, taking up Internet bandwidth and server processing time as well.
    Sites like Snopes.com debunk such hoaxes

    Unsolicited Commercial E-mail (Spam

    Unsolicited commercial ; typically tries to persuade you to buy something.
    Percent of all e-mail that is spam
    The term spam comes from a Monty Python skit

    Instant Messaging

    Technology that allows individuals to chat online.

    -To work properly IM has to:
    Attach to a server (typically announcing the IP address of the originating client)
    Announce your presence on the server

    Ways to fight spam include

    -E-mail filtering
    -Host/server filters
    -Educate users about spam
    -Cautious Internet surfing
    -Cautious towards unknown e-mail
    -Shut down open relays
    -Blacklisting or DNSBL
    -Greylisting
    -Reporting it

    Securing Instant Messaging

    Use a corporate server to keep in-house messages confidential
    Avoid file transfers
    Use encryption

    Primary E-mail Protocol
    Simple Mail Transfer

    - Simple Mail Transfer Protocol (SMTP) is the method by which mail is sent to the server as well as from server to server.
    SMTP by default uses TCP port 25.

    - IMAP is similar to POP3 in that it allows the client to retrieve messages from the server, but IMAP typically works in greater synchronization; for example, e-mails are left on the server until the client deletes them
    in the client, at which time IMAP instructs the server to delete them.

    Primary E-mail Protocol
    POP3 (Post Office Protocol version 3)

    -Uses TCP port 110 by default.
    -P___ is a method by which a client computer may connect to a server and download new messages.
    -Has been partly replaced by IMAP

    Primary E-mail Protocol
    IMAP (Internet Message Access Protocol)

    Similar to POP3 in that it allows the client to retrieve messages from the server, but typically works in greater synchronization; for example, e-mails are left on the server until the client deletes them
    in the client, at which time IMAP instructs the server to delete them.

    S/MIME: Secure/Multipurpose Internet Mail Extensions

    - _/____ is a secure implementation of the ____ protocol specification.
    --____ was created to allow Internet e-mail to support new and more creative features.
    --____ allows e-mail to handle multiple types of content in a message, including file transfers.
    -Every time you send a file as an e-mail attachment, you are using ____.
    -_/____ takes this content and specifies a framework for encrypting the message as a MIME attachment.

    AOL Instant Messenger (AIM)

    This was conceived as a way to find people of like interests online, and it was modeled after earlier chat programs.

    E-mail hoax

    Internet-based urban legends are spread through e-mail, with users forwarding them in seemingly endless loops around the globe.

    Encryption

    E-mail e_____ is a great way to protect the privacy of communication, since e-mail is a cleartext medium.

    Instant messaging (IM)

    While not part of the e-mail system, this is similar to e-mail in many respects, particularly in the sense that it is commonly plaintext and can transmit files.

    Mail relaying

    This is similar to dropping a letter off at a post office instead of letting the postal carrier pick it up at your mailbox. On the Internet, that consists of sending e-mail from a separate IP address, making it more difficult for the mail to be traced back to you.

    Open relay

    This is a mail server that will accept mail from anyone.

    Pretty Good Privacy (PGP)

    This is a good, specific application for e-mail encryption.
    --has plug-ins for many popular e-mail programs, including Outlook and Qualcomm's Eudora.
    --These plug-ins handle the encryption and decryption behind the scenes, and all that the user must do is enter the encryption key's passphrase to ensure that they are the owner of the key.

    Realtime Blackhole List (RBL)

    Started in 1997, this list is maintained in real time, specifically for blocking spam e-mail.

    Secure/Multipurpose Internet Mail Extensions (S/MIME)

    the e-mail protocol that allows encryption applications to work.

    Sender ID Framework

    Another server-based solution to spam, called the S_____ I_ F______. S___ attempts to authenticate messages by checking the sender's domain name against a list of IP addresses authorized to send e-mail by the domain name listed. This list is maintained in a text record published by the DNS, called a Sender Policy Framework (SPF) record.

    Simple Mail Transfer Protocol (SMTP)

    This is the method by which mail is sent to the server, as well as from server to server. SMTP by default uses TCP port 25.

    Key Difference b/w Viruses and Worms

    Viruses require a file to infect, whereas worms can exist independent of a file.

    Sets found in the same folder

    ISY 143 Chapter 12 Extension

    13 terms

    Vylos

    ISY 143 - Chapter 15

    48 terms

    Vylos

    obj 202.0x

    7 terms

    116448

    Information Security chapter 22

    17 terms

    dj_andrson

    Other sets by this creator

    Months

    6 terms

    Vylos

    5 Curriculum Lesson 3

    12 terms

    Vylos

    Ordinal numbers 1-30 (English)

    31 terms

    Vylos

    Korean Phrases

    57 terms

    Vylos

    Verified questions

    computer science

    True or False? /* is a character used for writing comments in Python.

    Verified answer

    computer science

    Show that there is no comparison sort whose running time is linear for at least half of the n! inputs of length n. What about a fraction of 1/n of the inputs of length n? What about a fraction $$ 1/2^n $$ ?

    Verified answer

    computer science

    Design an algorithm for a monitor that implements an alarm clock that enables a calling program to delay itself for a specified number of time units (ticks). You may assume the existence of a real hardware clock that invokes a function tick () in your monitor at regular intervals.

    Verified answer

    computer science

    Assume the following statement appears in a program: mylist = [ ] Which of the following statements would you use to add the string 'Labrador' to the list at index 0? $$ \begin{matrix} \text{a. mylist[0] = 'Labrador'}\\ \text{b. mylist.insert(0, 'Labrador')}\\ \text{c. mylist.append('Labrador')}\\ \text{d. mylist.insert('Labrador', 0)}\\ \end{matrix} $$

    Verified answer

    Recommended textbook solutions

    The ____ protocol is used by an application to retrieve mail from a mail server.

    Information Technology Project Management: Providing Measurable Organizational Value

    5th EditionJack T. Marchewka

    346 solutions

    The ____ protocol is used by an application to retrieve mail from a mail server.

    Starting Out with Python

    4th EditionTony Gaddis

    629 solutions

    The ____ protocol is used by an application to retrieve mail from a mail server.

    Starting Out with C++ from Control Structures to Objects

    8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis

    1,294 solutions

    The ____ protocol is used by an application to retrieve mail from a mail server.

    Computer Organization and Design MIPS Edition: The Hardware/Software Interface

    5th EditionDavid A. Patterson, John L. Hennessy

    220 solutions

    Other Quizlet sets

    Exam 3

    50 terms

    cgarza8594

    Chapter 11: E-Commerce and Digital Law

    19 terms

    logan_clark59

    module 3 living online

    123 terms

    nesha554

    Online Banking

    12 terms

    PersonalFinanceIHS