Chapter 11: E-mail and Social Media Investigations

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards
Phishing
Here a message attempts to get personal information by luring readers with false promises.
2
New cards
Pharming
Here the readers might go to the correct Web site address, but DNS poisoning takes them to a fake site.
3
New cards
Email Spoofing
A type of cyberattack that targets businesses by using emails with forged sender addresses.
4
New cards
Enhanced/Extended Simple Mail Transfer Protocol (ESMTP)
The clue to the e-mail being a fake was the _______ number in the message’s header, which is unique to each message an e-mail server transmits.
5
New cards
Client/Server Architecture
A configuration where messages are distributed from a central server to may connected client computers.
6
New cards
Forensic Linguistics
involves the application of scientific knowledge to language in the context of criminal and civil law.
7
New cards
Tracing
Way of determining message origin.
8
New cards
Network administrators
maintain logs of the inbound and outbound traffic routers handle.
9
New cards
Network administrators
maintain logs for firewalls that filter Internet traffic; these logs can help verify whether an e-mail message passed through the firewall.
10
New cards
Firewalls
maintain log files that track the Internet traffic destined for other networks or the network the firewalls are protecting.
11
New cards
Messaging Application Programming Interface (MAPI)
A Microsoft system that enables different e-mail applications to work together.
12
New cards
Multipurpose Internet Mail Extensions (MIME)
It is an extension of the original SMTP email protocol. It lets users exchange different kinds of data files, including audio, video, images and application programs, over email.
13
New cards
Online Social Networks (OSNs)
These are not just used for communication but also used to conduct business, brag about criminal activities, raise money, and have class discussions.