Chapter 11: E-mail and Social Media Investigations

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

Phishing

1 / 12

13 Terms

1

Phishing

Here a message attempts to get personal information by luring readers with false promises.

New cards
2

Pharming

Here the readers might go to the correct Web site address, but DNS poisoning takes them to a fake site.

New cards
3

Email Spoofing

A type of cyberattack that targets businesses by using emails with forged sender addresses.

New cards
4

Enhanced/Extended Simple Mail Transfer Protocol (ESMTP)

The clue to the e-mail being a fake was the _______ number in the message’s header, which is unique to each message an e-mail server transmits.

New cards
5

Client/Server Architecture

A configuration where messages are distributed from a central server to may connected client computers.

New cards
6

Forensic Linguistics

involves the application of scientific knowledge to language in the context of criminal and civil law.

New cards
7

Tracing

Way of determining message origin.

New cards
8

Network administrators

maintain logs of the inbound and outbound traffic routers handle.

New cards
9

Network administrators

maintain logs for firewalls that filter Internet traffic; these logs can help verify whether an e-mail message passed through the firewall.

New cards
10

Firewalls

maintain log files that track the Internet traffic destined for other networks or the network the firewalls are protecting.

New cards
11

Messaging Application Programming Interface (MAPI)

A Microsoft system that enables different e-mail applications to work together.

New cards
12

Multipurpose Internet Mail Extensions (MIME)

It is an extension of the original SMTP email protocol. It lets users exchange different kinds of data files, including audio, video, images and application programs, over email.

New cards
13

Online Social Networks (OSNs)

These are not just used for communication but also used to conduct business, brag about criminal activities, raise money, and have class discussions.

New cards

Explore top notes

note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 29 people
... ago
5.0(1)
note Note
studied byStudied by 17 people
... ago
5.0(1)
note Note
studied byStudied by 22 people
... ago
5.0(1)
note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 6501 people
... ago
4.9(26)
note Note
studied byStudied by 10 people
... ago
4.0(1)
note Note
studied byStudied by 111 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (70)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 10 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 4 people
... ago
4.0(1)
flashcards Flashcard (47)
studied byStudied by 17 people
... ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 52 people
... ago
4.5(2)
flashcards Flashcard (46)
studied byStudied by 16 people
... ago
5.0(1)
robot