Chapter 16 E-mail and Instant Messaging

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Emails depend on 3 protocols

SMTP, POP3, IMAP

2
New cards

Simple Mail Transfer Protocol (SMTP)

Mail is sent to a server and from server to server. Defaults to TCP port 25

3
New cards

POP3

Client computer may connect to a server and download new messages.

4
New cards

IMAP

Uses TCP port 143 and similar to POP3

Works in greater synchronization. Allow client to retrieve information from server

5
New cards

STARTTLS

A command (not an acronym) used to upgrade an unencrypted connection to an encrypted connection on the same port.

6
New cards

Which Email ports must be open?

25, 110, 143

7
New cards

Mail User Agent (MUA)

A messaging component used as a stand-alone application by the user.

8
New cards

Mail Transfer Agent (MTA)

An e-mail server.

9
New cards

Mail Delivery Agent (MDA)

The service that downloads e-mail from a mail transfer agent.

10
New cards

Email Structure

Two elements: Header and Body

Entire message sent via plain ASCII text
Attachments use Base64 encoding

11
New cards

Multipurpose Internet Mail Extensions (MIME)

Specification for sending files as attachments to e-mail.

12
New cards

Email Hoax

An email message that is trying to tempt you to give out personal information or trying to scam you.

13
New cards

Blacklisting

Noting which domains/systems are known to send spam and reject messages from those addresses.

SPAM defense

14
New cards

Trusted Servers

White listing.

Trusted domains and systems

SPAM defense

15
New cards

Delay-based filtering

Insert a deliberate pause between the connection and the banner. Any system that sends data during pause is usually malicious (usually because spam is sent constantly).

SPAM defense

16
New cards

PTR and reverse DNS checks

Conducts reverse DNS check to determine origin address. Make sure it is a real one.

SPAM defense

17
New cards

Egress filtering

filter packets going from the network to the outside

18
New cards

Mail Relay

A device in which email is stored and forwarded from, and sends the email to its final destination

19
New cards

Open Relay

a mail server that will accept mail from anyone

20
New cards

Greylisting

Emails are bounced as temporary rejection because spam will not resend

21
New cards

Real-time Blackhole List (RBL)

system that uses DNS information to
detect and dump spam e-mails.

22
New cards

Sender Policy Framework (SPF)

An e-mail validation system designed to prevent e-mail spam by detecting e-mail spoofing, a common vulnerability, by verifying sender IP addresses.

23
New cards

Sender ID Framework (SIDF)

Attempts to authenticate messages by checking the sender's domain name against a list of IP addresses authorized to send email by the domain name listed

24
New cards

DomainKeys Identified Mail (DKIM)

Email validation system employed to detect email spoofing

25
New cards

S/MIME

Secure/Multipurpose Internet Mail Extensions

Developed by RSA and uses X.509 format

26
New cards

Why is both symmetric and asymmetric encryption used in email?

To increase speed of encryption and decryption

27
New cards

Pretty Good Privacy (PGP)

A method of encrypting and decrypting e-mail messages. It can also be used to encrypt a digital signature.