Email Forensics & Malware Forensics Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/52

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards related to email and malware forensics. The definitions are extracted from the provided lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

Phishing

Attempts to get personal information from the reader by containing links to text on a Web page.

2
New cards

Pharming

DNS poisoning takes the user to a fake site.

3
New cards

Spam Act 2003

Prohibits the sending of unsolicited commercial electronic messages with an Australian link.

4
New cards

Email Header

The envelope of the email containing information such as sender and receiver address, subject, time of creation, delivery stamps, message author, CC, and BCC

5
New cards

Email Body

The primary content or letter of the message

6
New cards

Email Encoding

Acts as a universal translator for the email, allowing different email programs to pass data to one another.

7
New cards

MIME (Multipurpose Internet Mail Extensions)

A protocol that allows non-ASCII files (video, graphics, and audio) to be built into the email message

8
New cards

UUCODE

UNIX format for attachment encoding

9
New cards

BINHEX

Mac format for attachment encoding

10
New cards

Attachment

Extra item that comes as a supplement to the body of an email.

11
New cards

SMTP

Simple Mail Transfer Protocol - core Internet protocol used to transfer from client to server and server to server.

12
New cards

POP3

Post Office Protocol allows clients to retrieve stored e-mail.

13
New cards

IMAP

Internet Message Access Protocol provides a means of managing e-mail messages on a remote server and retrieve stored e-mail.

14
New cards

Applicable Privacy Laws

Electronic Communications Privacy Act and the Stored Communications Act apply to e-mail.

15
New cards

Message-ID

Provides a unique message identifier that refers to a particular version of a particular message.

16
New cards

Tracing

Determining message origin.

17
New cards

Router logs

Record all incoming and outgoing traffic and have rules to allow or disallow traffic.

18
New cards

Firewall logs

Filter e-mail traffic and verify whether the e-mail passed through.

19
New cards

Malware

Software that cybercriminals use to harm your computer system or network.

20
New cards

Static Analysis

Involves going through the executable binary codes without the actual execution.

21
New cards

Run-time Analysis

Involves executing malware code to simulate the environment.

22
New cards

Artifacts

Pieces of data that show malicious activity.

23
New cards

Virus

A type of malware that replicates itself and spreads to other computers.

24
New cards

Worm

A type of malware that spreads itself without human interaction.

25
New cards

Trojan Horse

Malicious code disguised as legitimate software.

26
New cards

Firewall

Software designed to block unauthorized access to a computer system.

27
New cards

The process of converting information into a

28
New cards

Encryption

The process of converting information into a secret code to prevent unauthorized access.

29
New cards

Decryption

The process of decoding encrypted information to make it readable.

30
New cards

Private Key

A cryptographic key that is used to encrypt and decrypt data, and must be kept secret.

31
New cards

Public Key

A cryptographic key that can be shared with others, used for encryption or verification of digital signatures.

32
New cards

Cipher

A mathematical algorithm used to perform encryption and decryption.

33
New cards

Phishing

Attempts to get personal information from the reader by containing links to text on a Web page.

34
New cards

Pharming

DNS poisoning takes the user to a fake site.

35
New cards

Spam Act 2003

Prohibits the sending of unsolicited commercial electronic messages with an Australian link.

36
New cards

Email Header

The envelope of the email containing information such as sender and receiver address, subject, time of creation, delivery stamps, message author, CC, and BCC

37
New cards

Email Body

The primary content or letter of the message

38
New cards

Email Encoding

Acts as a universal translator for the email, allowing different email programs to pass data to one another.

39
New cards

MIME (Multipurpose Internet Mail Extensions)

A protocol that allows non-ASCII files (video, graphics, and audio) to be built into the email message

40
New cards

UUCODE

UNIX format for attachment encoding

41
New cards

BINHEX

Mac format for attachment encoding

42
New cards

Attachment

Extra item that comes as a supplement to the body of an email.

43
New cards

SMTP

Simple Mail Transfer Protocol - core Internet protocol used to transfer from client to server and server to server.

44
New cards

POP3

Post Office Protocol allows clients to retrieve stored e-mail.

45
New cards

IMAP

Internet Message Access Protocol provides a means of managing e-mail messages on a remote server and retrieve stored e-mail.

46
New cards

Applicable Privacy Laws

Electronic Communications Privacy Act and the Stored Communications Act apply to e-mail.

47
New cards

Message-ID

Provides a unique message identifier that refers to a particular version of a particular message.

48
New cards

Tracing

Determining message origin.

49
New cards

Router logs

Record all incoming and outgoing traffic and have rules to allow or disallow traffic.

50
New cards

Firewall logs

Filter e-mail traffic and verify whether the e-mail passed through.

51
New cards

Malware

Software that cybercriminals use to harm your computer system or network.

52
New cards

Static Analysis

Involves going through the executable binary codes without the actual execution.

53
New cards

Run

Involves executing malware code to simulate the environment.