1/52
Vocabulary flashcards related to email and malware forensics. The definitions are extracted from the provided lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Phishing
Attempts to get personal information from the reader by containing links to text on a Web page.
Pharming
DNS poisoning takes the user to a fake site.
Spam Act 2003
Prohibits the sending of unsolicited commercial electronic messages with an Australian link.
Email Header
The envelope of the email containing information such as sender and receiver address, subject, time of creation, delivery stamps, message author, CC, and BCC
Email Body
The primary content or letter of the message
Email Encoding
Acts as a universal translator for the email, allowing different email programs to pass data to one another.
MIME (Multipurpose Internet Mail Extensions)
A protocol that allows non-ASCII files (video, graphics, and audio) to be built into the email message
UUCODE
UNIX format for attachment encoding
BINHEX
Mac format for attachment encoding
Attachment
Extra item that comes as a supplement to the body of an email.
SMTP
Simple Mail Transfer Protocol - core Internet protocol used to transfer from client to server and server to server.
POP3
Post Office Protocol allows clients to retrieve stored e-mail.
IMAP
Internet Message Access Protocol provides a means of managing e-mail messages on a remote server and retrieve stored e-mail.
Applicable Privacy Laws
Electronic Communications Privacy Act and the Stored Communications Act apply to e-mail.
Message-ID
Provides a unique message identifier that refers to a particular version of a particular message.
Tracing
Determining message origin.
Router logs
Record all incoming and outgoing traffic and have rules to allow or disallow traffic.
Firewall logs
Filter e-mail traffic and verify whether the e-mail passed through.
Malware
Software that cybercriminals use to harm your computer system or network.
Static Analysis
Involves going through the executable binary codes without the actual execution.
Run-time Analysis
Involves executing malware code to simulate the environment.
Artifacts
Pieces of data that show malicious activity.
Virus
A type of malware that replicates itself and spreads to other computers.
Worm
A type of malware that spreads itself without human interaction.
Trojan Horse
Malicious code disguised as legitimate software.
Firewall
Software designed to block unauthorized access to a computer system.
The process of converting information into a
Encryption
The process of converting information into a secret code to prevent unauthorized access.
Decryption
The process of decoding encrypted information to make it readable.
Private Key
A cryptographic key that is used to encrypt and decrypt data, and must be kept secret.
Public Key
A cryptographic key that can be shared with others, used for encryption or verification of digital signatures.
Cipher
A mathematical algorithm used to perform encryption and decryption.
Phishing
Attempts to get personal information from the reader by containing links to text on a Web page.
Pharming
DNS poisoning takes the user to a fake site.
Spam Act 2003
Prohibits the sending of unsolicited commercial electronic messages with an Australian link.
Email Header
The envelope of the email containing information such as sender and receiver address, subject, time of creation, delivery stamps, message author, CC, and BCC
Email Body
The primary content or letter of the message
Email Encoding
Acts as a universal translator for the email, allowing different email programs to pass data to one another.
MIME (Multipurpose Internet Mail Extensions)
A protocol that allows non-ASCII files (video, graphics, and audio) to be built into the email message
UUCODE
UNIX format for attachment encoding
BINHEX
Mac format for attachment encoding
Attachment
Extra item that comes as a supplement to the body of an email.
SMTP
Simple Mail Transfer Protocol - core Internet protocol used to transfer from client to server and server to server.
POP3
Post Office Protocol allows clients to retrieve stored e-mail.
IMAP
Internet Message Access Protocol provides a means of managing e-mail messages on a remote server and retrieve stored e-mail.
Applicable Privacy Laws
Electronic Communications Privacy Act and the Stored Communications Act apply to e-mail.
Message-ID
Provides a unique message identifier that refers to a particular version of a particular message.
Tracing
Determining message origin.
Router logs
Record all incoming and outgoing traffic and have rules to allow or disallow traffic.
Firewall logs
Filter e-mail traffic and verify whether the e-mail passed through.
Malware
Software that cybercriminals use to harm your computer system or network.
Static Analysis
Involves going through the executable binary codes without the actual execution.
Run
Involves executing malware code to simulate the environment.