Upgrade to remove ads
Only SGD 41.99/year
- Science
- Computer Science
- Computer Security and Reliability
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (25)
Security of E-mail
Originally launched unsecure; remains mostly unsecure.
Encryption is possible, but not the norm
Uses S/MIME or PGP
-Internet e-mail depends on three primary protocols:
SMTP
POP3
IMAP
E-mail is used:
-To spread viruses
-To forward hoaxes
-To phish
-To scam (e.g., Nigerian Princess)
-To spam
Pretty Good Privacy (PGP)
PGP implements e-mail security in a similar fashion to S/MIME, but uses completely different protocols.
-The content is encrypted with the generated symmetric key, and that key is encrypted with the public key of the recipient of the e-mail for confidentiality.
-PGP manages keys locally in its own software. It stores:
Local keys
User's public key
User's private key
Symmetric keys
Malicious Code Protection Measures
Antivirus
E-mail scan
Disable
Preview panes
Scripting support
Follow safe practices and procedures
Educate employees
Hoax E-mails
E-mail hoaxes are mostly a nuisance, wasting everyone's time, taking up Internet bandwidth and server processing time as well.
Sites like Snopes.com debunk such hoaxes
Unsolicited Commercial E-mail (Spam
Unsolicited commercial ; typically tries to persuade you to buy something.
Percent of all e-mail that is spam
The term spam comes from a Monty Python skit
Instant Messaging
Technology that allows individuals to chat online.
-To work properly IM has to:
Attach to a server (typically announcing the IP address of the originating client)
Announce your presence on the server
Ways to fight spam include
-E-mail filtering
-Host/server filters
-Educate users about spam
-Cautious Internet
surfing
-Cautious towards unknown e-mail
-Shut down open relays
-Blacklisting or DNSBL
-Greylisting
-Reporting it
Securing Instant Messaging
Use a corporate server to keep in-house messages confidential
Avoid file transfers
Use encryption
Primary E-mail Protocol
Simple Mail Transfer
- Simple Mail
Transfer Protocol (SMTP) is the method by which mail is sent to the server as well as from server to server.
SMTP by default uses TCP port 25.
- IMAP is similar to POP3 in that it allows the client to retrieve messages from the server, but IMAP typically works in greater synchronization; for example, e-mails are left on the server until the client deletes them
in the client, at which time IMAP instructs the server to delete them.
Primary
E-mail Protocol
POP3 (Post Office Protocol version 3)
-Uses TCP port 110 by default.
-P___ is a method by which a client computer may connect to a server and download new messages.
-Has been partly replaced by IMAP
Primary E-mail Protocol
IMAP (Internet Message Access Protocol)
Similar to POP3 in that it allows the client to retrieve messages from the
server, but typically works in greater synchronization; for example, e-mails are left on the server until the client deletes them
in the client, at which time IMAP instructs the server to delete them.
S/MIME: Secure/Multipurpose Internet Mail Extensions
- _/____ is a secure implementation of the ____ protocol specification.
--____ was created to allow Internet e-mail to support new and more creative
features.
--____ allows e-mail to handle multiple types of content in a message, including file transfers.
-Every time you send a file as an e-mail attachment, you are using ____.
-_/____ takes this content and specifies a framework for encrypting the message as a MIME attachment.
AOL Instant Messenger (AIM)
This was conceived as a way to find people of like interests online, and it was modeled after earlier chat programs.
E-mail hoax
Internet-based urban legends are spread through e-mail, with users forwarding them in seemingly endless loops around the globe.
Encryption
E-mail e_____ is a great way to protect the privacy of communication, since e-mail is a cleartext medium.
Instant messaging (IM)
While not part of the e-mail system, this is similar to e-mail in many respects, particularly in the sense that it is commonly plaintext and can transmit files.
Mail relaying
This is similar to dropping a letter off at a post office instead of letting the postal carrier pick it up at your mailbox. On the Internet, that consists of sending e-mail from a separate IP address, making it more difficult for the mail to be traced back to you.
Open relay
This is a mail server that will accept mail from anyone.
Pretty Good Privacy (PGP)
This is a good, specific application for e-mail encryption.
--has plug-ins for many popular e-mail programs, including Outlook and Qualcomm's Eudora.
--These plug-ins handle the encryption and decryption behind the scenes, and all that the user must do is enter the encryption key's passphrase to ensure that they are the owner of the key.
Realtime Blackhole List (RBL)
Started in 1997, this list is maintained in real time, specifically for blocking spam e-mail.
Secure/Multipurpose Internet Mail Extensions (S/MIME)
the e-mail protocol that allows encryption applications to work.
Sender ID Framework
Another server-based solution to spam, called the S_____ I_ F______. S___ attempts to authenticate messages by checking the sender's domain name against a list of IP addresses authorized to send e-mail by the domain name listed. This list is maintained in a text record published by the DNS, called a Sender Policy Framework (SPF) record.
Simple Mail Transfer Protocol (SMTP)
This is the method by which mail is sent to the server, as well as from server to server. SMTP by default uses TCP port 25.
Key Difference b/w Viruses and Worms
Viruses require a file to infect, whereas worms can exist independent of a file.
Sets found in the same folderISY 143 Chapter 12 Extension
13 terms
Vylos
ISY 143 - Chapter 15
48 terms
Vylos
obj 202.0x
7 terms
116448
Information Security chapter 22
17 terms
dj_andrson
Other sets by this creatorMonths
6 terms
Vylos
5 Curriculum Lesson 3
12 terms
Vylos
Ordinal numbers 1-30 (English)
31 terms
Vylos
Korean Phrases
57 terms
Vylos
Verified questionscomputer science
True or False? /* is a character used for writing comments in Python.
Verified answer
computer science
Show that there is no comparison sort whose running time is linear for at least half of the n! inputs of length n. What about a fraction of 1/n of the inputs of length n? What about a fraction $$ 1/2^n $$ ?
Verified answer
computer science
Design an algorithm for a monitor that implements an alarm clock that enables a calling program to delay itself for a specified number of time units (ticks). You may assume the existence of a real hardware clock that invokes a function tick () in your monitor at regular intervals.
Verified answer
computer science
Assume the following statement appears in a program: mylist = [ ] Which of the following statements would you use to add the string 'Labrador' to the list at index 0? $$ \begin{matrix} \text{a. mylist[0] = 'Labrador'}\\ \text{b. mylist.insert(0, 'Labrador')}\\ \text{c. mylist.append('Labrador')}\\ \text{d. mylist.insert('Labrador', 0)}\\ \end{matrix} $$
Verified answer
Recommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Starting Out with Python
4th EditionTony Gaddis
629 solutions
Starting Out with C++ from Control Structures to Objects
8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis
1,294 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Other Quizlet setsExam 3
50 terms
cgarza8594
Chapter 11: E-Commerce and Digital Law
19 terms
logan_clark59
module 3 living online
123 terms
nesha554
Online Banking
12 terms
PersonalFinanceIHS