Upgrade to remove ads Show Only SGD 41.99/year
Terms in this set (25)Security of E-mail Originally launched unsecure; remains mostly unsecure. -Internet e-mail depends on three primary protocols: E-mail is used: -To spread viruses Pretty Good Privacy (PGP) PGP implements e-mail security in a similar fashion to S/MIME, but uses completely different protocols. -The content is encrypted with the generated symmetric key, and that key is encrypted with the public key of the recipient of the e-mail for confidentiality. -PGP manages keys locally in its own software. It stores: Malicious Code Protection Measures Antivirus Hoax E-mails E-mail hoaxes are mostly a nuisance, wasting everyone's time, taking up Internet bandwidth and server processing time as well. Unsolicited Commercial E-mail (Spam Unsolicited commercial ; typically tries to persuade you to buy something. Instant Messaging Technology that allows individuals to chat online. -To work properly IM has to: Ways to fight spam include -E-mail filtering Securing Instant Messaging Use a corporate server to keep in-house messages confidential Primary E-mail Protocol - Simple Mail
Transfer Protocol (SMTP) is the method by which mail is sent to the server as well as from server to server. - IMAP is similar to POP3 in that it allows the client to retrieve messages from the server, but IMAP typically works in greater synchronization; for example, e-mails are left on the server until the client deletes them Primary
E-mail Protocol -Uses TCP port 110 by default. Primary E-mail Protocol Similar to POP3 in that it allows the client to retrieve messages from the
server, but typically works in greater synchronization; for example, e-mails are left on the server until the client deletes them S/MIME: Secure/Multipurpose Internet Mail Extensions - _/____ is a secure implementation of the ____ protocol specification. AOL Instant Messenger (AIM) This was conceived as a way to find people of like interests online, and it was modeled after earlier chat programs. E-mail hoax Internet-based urban legends are spread through e-mail, with users forwarding them in seemingly endless loops around the globe. Encryption E-mail e_____ is a great way to protect the privacy of communication, since e-mail is a cleartext medium. Instant messaging (IM) While not part of the e-mail system, this is similar to e-mail in many respects, particularly in the sense that it is commonly plaintext and can transmit files. Mail relaying This is similar to dropping a letter off at a post office instead of letting the postal carrier pick it up at your mailbox. On the Internet, that consists of sending e-mail from a separate IP address, making it more difficult for the mail to be traced back to you. Open relay This is a mail server that will accept mail from anyone. Pretty Good Privacy (PGP) This is a good, specific application for e-mail encryption. Realtime Blackhole List (RBL) Started in 1997, this list is maintained in real time, specifically for blocking spam e-mail. Secure/Multipurpose Internet Mail Extensions (S/MIME) the e-mail protocol that allows encryption applications to work. Sender ID Framework Another server-based solution to spam, called the S_____ I_ F______. S___ attempts to authenticate messages by checking the sender's domain name against a list of IP addresses authorized to send e-mail by the domain name listed. This list is maintained in a text record published by the DNS, called a Sender Policy Framework (SPF) record. Simple Mail Transfer Protocol (SMTP) This is the method by which mail is sent to the server, as well as from server to server. SMTP by default uses TCP port 25. Key Difference b/w Viruses and Worms Viruses require a file to infect, whereas worms can exist independent of a file. Sets found in the same folderISY 143 Chapter 12 Extension13 terms Vylos ISY 143 - Chapter 1548 terms Vylos obj 202.0x7 terms 116448 Information Security chapter 2217 terms dj_andrson Other sets by this creatorMonths6 terms Vylos 5 Curriculum Lesson 312 terms Vylos Ordinal numbers 1-30 (English)31 terms Vylos Korean Phrases57 terms Vylos Verified questionscomputer science True or False? /* is a character used for writing comments in Python. Verified answer
computer science Show that there is no comparison sort whose running time is linear for at least half of the n! inputs of length n. What about a fraction of 1/n of the inputs of length n? What about a fraction $$ 1/2^n $$ ? Verified answer
computer science Design an algorithm for a monitor that implements an alarm clock that enables a calling program to delay itself for a specified number of time units (ticks). You may assume the existence of a real hardware clock that invokes a function tick () in your monitor at regular intervals. Verified answer computer science Assume the following statement appears in a program: mylist = [ ] Which of the following statements would you use to add the string 'Labrador' to the list at index 0? $$ \begin{matrix} \text{a. mylist[0] = 'Labrador'}\\ \text{b. mylist.insert(0, 'Labrador')}\\ \text{c. mylist.append('Labrador')}\\ \text{d. mylist.insert('Labrador', 0)}\\ \end{matrix} $$ Verified answer Recommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Starting Out with Python4th EditionTony Gaddis 629 solutions Starting Out with C++ from Control Structures to Objects8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis 1,294 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Other Quizlet setsExam 350 terms cgarza8594 Chapter 11: E-Commerce and Digital Law19 terms logan_clark59 module 3 living online123 terms nesha554 Online Banking12 terms PersonalFinanceIHS |