The ____ protocol is used by an application to retrieve mail from a mail server.

Upgrade to remove ads

Only SGD 41.99/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (25)

Security of E-mail

Originally launched unsecure; remains mostly unsecure.
Encryption is possible, but not the norm
Uses S/MIME or PGP

-Internet e-mail depends on three primary protocols:
SMTP
POP3
IMAP

E-mail is used:

-To spread viruses
-To forward hoaxes
-To phish
-To scam (e.g., Nigerian Princess)
-To spam

Pretty Good Privacy (PGP)

PGP implements e-mail security in a similar fashion to S/MIME, but uses completely different protocols.

-The content is encrypted with the generated symmetric key, and that key is encrypted with the public key of the recipient of the e-mail for confidentiality.

-PGP manages keys locally in its own software. It stores:
Local keys
User's public key
User's private key
Symmetric keys

Malicious Code Protection Measures

Antivirus
E-mail scan
Disable
Preview panes
Scripting support
Follow safe practices and procedures
Educate employees

Hoax E-mails

E-mail hoaxes are mostly a nuisance, wasting everyone's time, taking up Internet bandwidth and server processing time as well.
Sites like Snopes.com debunk such hoaxes

Unsolicited Commercial E-mail (Spam

Unsolicited commercial ; typically tries to persuade you to buy something.
Percent of all e-mail that is spam
The term spam comes from a Monty Python skit

Instant Messaging

Technology that allows individuals to chat online.

-To work properly IM has to:
Attach to a server (typically announcing the IP address of the originating client)
Announce your presence on the server

Ways to fight spam include

-E-mail filtering
-Host/server filters
-Educate users about spam
-Cautious Internet surfing
-Cautious towards unknown e-mail
-Shut down open relays
-Blacklisting or DNSBL
-Greylisting
-Reporting it

Securing Instant Messaging

Use a corporate server to keep in-house messages confidential
Avoid file transfers
Use encryption

Primary E-mail Protocol
Simple Mail Transfer

- Simple Mail Transfer Protocol (SMTP) is the method by which mail is sent to the server as well as from server to server.
SMTP by default uses TCP port 25.

- IMAP is similar to POP3 in that it allows the client to retrieve messages from the server, but IMAP typically works in greater synchronization; for example, e-mails are left on the server until the client deletes them
in the client, at which time IMAP instructs the server to delete them.

Primary E-mail Protocol
POP3 (Post Office Protocol version 3)

-Uses TCP port 110 by default.
-P___ is a method by which a client computer may connect to a server and download new messages.
-Has been partly replaced by IMAP

Primary E-mail Protocol
IMAP (Internet Message Access Protocol)

Similar to POP3 in that it allows the client to retrieve messages from the server, but typically works in greater synchronization; for example, e-mails are left on the server until the client deletes them
in the client, at which time IMAP instructs the server to delete them.

S/MIME: Secure/Multipurpose Internet Mail Extensions

- _/____ is a secure implementation of the ____ protocol specification.
--____ was created to allow Internet e-mail to support new and more creative features.
--____ allows e-mail to handle multiple types of content in a message, including file transfers.
-Every time you send a file as an e-mail attachment, you are using ____.
-_/____ takes this content and specifies a framework for encrypting the message as a MIME attachment.

AOL Instant Messenger (AIM)

This was conceived as a way to find people of like interests online, and it was modeled after earlier chat programs.

E-mail hoax

Internet-based urban legends are spread through e-mail, with users forwarding them in seemingly endless loops around the globe.

Encryption

E-mail e_____ is a great way to protect the privacy of communication, since e-mail is a cleartext medium.

Instant messaging (IM)

While not part of the e-mail system, this is similar to e-mail in many respects, particularly in the sense that it is commonly plaintext and can transmit files.

Mail relaying

This is similar to dropping a letter off at a post office instead of letting the postal carrier pick it up at your mailbox. On the Internet, that consists of sending e-mail from a separate IP address, making it more difficult for the mail to be traced back to you.

Open relay

This is a mail server that will accept mail from anyone.

Pretty Good Privacy (PGP)

This is a good, specific application for e-mail encryption.
--has plug-ins for many popular e-mail programs, including Outlook and Qualcomm's Eudora.
--These plug-ins handle the encryption and decryption behind the scenes, and all that the user must do is enter the encryption key's passphrase to ensure that they are the owner of the key.

Realtime Blackhole List (RBL)

Started in 1997, this list is maintained in real time, specifically for blocking spam e-mail.

Secure/Multipurpose Internet Mail Extensions (S/MIME)

the e-mail protocol that allows encryption applications to work.

Sender ID Framework

Another server-based solution to spam, called the S_____ I_ F______. S___ attempts to authenticate messages by checking the sender's domain name against a list of IP addresses authorized to send e-mail by the domain name listed. This list is maintained in a text record published by the DNS, called a Sender Policy Framework (SPF) record.

Simple Mail Transfer Protocol (SMTP)

This is the method by which mail is sent to the server, as well as from server to server. SMTP by default uses TCP port 25.

Key Difference b/w Viruses and Worms

Viruses require a file to infect, whereas worms can exist independent of a file.

Sets found in the same folder

ISY 143 Chapter 12 Extension

13 terms

Vylos

ISY 143 - Chapter 15

48 terms

Vylos

obj 202.0x

7 terms

116448

Information Security chapter 22

17 terms

dj_andrson

Other sets by this creator

Months

6 terms

Vylos

5 Curriculum Lesson 3

12 terms

Vylos

Ordinal numbers 1-30 (English)

31 terms

Vylos

Korean Phrases

57 terms

Vylos

Verified questions

computer science

True or False? /* is a character used for writing comments in Python.

Verified answer

computer science

Show that there is no comparison sort whose running time is linear for at least half of the n! inputs of length n. What about a fraction of 1/n of the inputs of length n? What about a fraction $$ 1/2^n $$ ?

Verified answer

computer science

Design an algorithm for a monitor that implements an alarm clock that enables a calling program to delay itself for a specified number of time units (ticks). You may assume the existence of a real hardware clock that invokes a function tick () in your monitor at regular intervals.

Verified answer

computer science

Assume the following statement appears in a program: mylist = [ ] Which of the following statements would you use to add the string 'Labrador' to the list at index 0? $$ \begin{matrix} \text{a. mylist[0] = 'Labrador'}\\ \text{b. mylist.insert(0, 'Labrador')}\\ \text{c. mylist.append('Labrador')}\\ \text{d. mylist.insert('Labrador', 0)}\\ \end{matrix} $$

Verified answer

Recommended textbook solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Starting Out with Python

4th EditionTony Gaddis

629 solutions

Starting Out with C++ from Control Structures to Objects

8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis

1,294 solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Other Quizlet sets

Exam 3

50 terms

cgarza8594

Chapter 11: E-Commerce and Digital Law

19 terms

logan_clark59

module 3 living online

123 terms

nesha554

Online Banking

12 terms

PersonalFinanceIHS

Chủ đề