Email Forensics & Malware Forensics Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Flashcards for reviewing key vocabulary terms from the lecture notes on Email Forensics and Malware Forensics.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Phishing

An attempt to obtain personal information from a reader through email, often containing links to a fake webpage.

2
New cards

Pharming

Redirecting users to a bogus website by corrupting the domain name system (DNS).

3
New cards

Spoofing email

The practice of disguising an email's origin to commit fraud.

4
New cards

Spam Act 2003

Prohibits the sending of unsolicited commercial electronic messages with an Australian link.

5
New cards

Email Header

The 'envelope' of the email containing information such as sender, receiver, subject, and timestamps.

6
New cards

Email Body

The actual content or text of the email message.

7
New cards

MIME (Multipurpose Internet Mail Extensions)

A protocol allowing non-ASCII files (video, graphics, audio) to be included in email messages.

8
New cards

UUCODE

A UNIX format for encoding attachments in email.

9
New cards

BINHEX

A Mac format for encoding attachments in email.

10
New cards

Email Attachment

An extra file sent along with an email message, supplementing the body.

11
New cards

SMTP

Simple Mail Transfer Protocol, used to transfer email from client to server and server to server.

12
New cards

POP3

Post Office Protocol, allows clients to retrieve stored email from a server.

13
New cards

IMAP

Internet Message Access Protocol, provides a means of managing email messages on a remote server.

14
New cards

Applicable privacy laws for jurisdiction

Electronic Communications Privacy Act and Stored Communications Act

15
New cards

ARIN (American Registry for Internet Numbers)

To find point of contact of a domain’s IP address

16
New cards

Router logs

records all incoming and outgoing traffic and have rules to allow or disallow traffic.

17
New cards

Firewall logs

Filters e-mail traffic and verify whether the e-mail passed through

18
New cards

/etc/sendmail.cf

Configuration file for Sendmail

19
New cards

/etc/syslog.conf

Specifies how and which events Sendmail logs

20
New cards

master.cf and main.cf

configuration files of Postfix

21
New cards

Information Store Files

Database files used by Microsoft Exchange Server (*.edb).

22
New cards

Malware

Software that cybercriminals use to harm a computer system or network.

23
New cards

Objective of Malware Forensics

examining the malicious code and its behaviour in a secure and preserved environment

24
New cards

Malware forensics artifacts

the pieces of data that shows malicious activity.

25
New cards

Malware Forensics (Static Analysis)

code analysis, involves going through the executable binary codes without the actual execution

26
New cards

Malware Forensics (Run-Time Analysis)

behavioral analysis, involves executing malware code to simulate the environment