Chapter 11: E-mail and Social Media Investigations

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 12

13 Terms

1

Phishing

Here a message attempts to get personal information by luring readers with false promises.

New cards
2

Pharming

Here the readers might go to the correct Web site address, but DNS poisoning takes them to a fake site.

New cards
3

Email Spoofing

A type of cyberattack that targets businesses by using emails with forged sender addresses.

New cards
4

Enhanced/Extended Simple Mail Transfer Protocol (ESMTP)

The clue to the e-mail being a fake was the _______ number in the message’s header, which is unique to each message an e-mail server transmits.

New cards
5

Client/Server Architecture

A configuration where messages are distributed from a central server to may connected client computers.

New cards
6

Forensic Linguistics

involves the application of scientific knowledge to language in the context of criminal and civil law.

New cards
7

Tracing

Way of determining message origin.

New cards
8

Network administrators

maintain logs of the inbound and outbound traffic routers handle.

New cards
9

Network administrators

maintain logs for firewalls that filter Internet traffic; these logs can help verify whether an e-mail message passed through the firewall.

New cards
10

Firewalls

maintain log files that track the Internet traffic destined for other networks or the network the firewalls are protecting.

New cards
11

Messaging Application Programming Interface (MAPI)

A Microsoft system that enables different e-mail applications to work together.

New cards
12

Multipurpose Internet Mail Extensions (MIME)

It is an extension of the original SMTP email protocol. It lets users exchange different kinds of data files, including audio, video, images and application programs, over email.

New cards
13

Online Social Networks (OSNs)

These are not just used for communication but also used to conduct business, brag about criminal activities, raise money, and have class discussions.

New cards

Explore top notes

note Note
studied byStudied by 15 people
844 days ago
5.0(1)
note Note
studied byStudied by 34 people
872 days ago
5.0(2)
note Note
studied byStudied by 10 people
861 days ago
5.0(2)
note Note
studied byStudied by 1 person
771 days ago
5.0(1)
note Note
studied byStudied by 769 people
1006 days ago
5.0(2)
note Note
studied byStudied by 54 people
784 days ago
4.0(2)
note Note
studied byStudied by 31 people
120 days ago
5.0(1)
note Note
studied byStudied by 10832 people
662 days ago
4.7(47)

Explore top flashcards

flashcards Flashcard (50)
studied byStudied by 9 people
736 days ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 5 people
875 days ago
5.0(1)
flashcards Flashcard (66)
studied byStudied by 4 people
446 days ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 14 people
357 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 9 people
793 days ago
4.0(1)
flashcards Flashcard (71)
studied byStudied by 7 people
807 days ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 8 people
1 day ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 252 people
705 days ago
5.0(11)
robot