Phishing
Here a message attempts to get personal information by luring readers with false promises.
Pharming
Here the readers might go to the correct Web site address, but DNS poisoning takes them to a fake site.
Email Spoofing
A type of cyberattack that targets businesses by using emails with forged sender addresses.
Enhanced/Extended Simple Mail Transfer Protocol (ESMTP)
The clue to the e-mail being a fake was the _______ number in the message’s header, which is unique to each message an e-mail server transmits.
Client/Server Architecture
A configuration where messages are distributed from a central server to may connected client computers.
Forensic Linguistics
involves the application of scientific knowledge to language in the context of criminal and civil law.
Tracing
Way of determining message origin.
Network administrators
maintain logs of the inbound and outbound traffic routers handle.
Network administrators
maintain logs for firewalls that filter Internet traffic; these logs can help verify whether an e-mail message passed through the firewall.
Firewalls
maintain log files that track the Internet traffic destined for other networks or the network the firewalls are protecting.
Messaging Application Programming Interface (MAPI)
A Microsoft system that enables different e-mail applications to work together.
Multipurpose Internet Mail Extensions (MIME)
It is an extension of the original SMTP email protocol. It lets users exchange different kinds of data files, including audio, video, images and application programs, over email.
Online Social Networks (OSNs)
These are not just used for communication but also used to conduct business, brag about criminal activities, raise money, and have class discussions.