Term
Email System Architecture |
|
Definition
Client
MSA
Transmitter
Internet
Receiver
MDA <> Mailstore
Client (POP, IMAP) or Browser (HTTP) |
|
|
Term
|
Definition
|
|
Term
|
Definition
Mail Storage and Delivery Agent |
|
|
Term
What is a computer program for reading and sending e-mails? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Post Office Protocol Server |
|
|
Term
What is the Post Office Protocol Sever? |
|
Definition
Popular email protocol used to deliver message from a mail server. |
|
|
Term
|
Definition
Internet Message Access Protocol Server |
|
|
Term
What is the difference between POP3 and IMAP? |
|
Definition
POP3 by default the message in server is deleted.
IMAP messages stay in the server even after access and users can arrange emails into folders. |
|
|
Term
|
Definition
Simple Mail Transfer Protocol Server |
|
|
Term
What is a Simple Mail Transfer Protocol Server? |
|
Definition
An outgoing email server with a push protocol that first consults DNS to find IP address of the recipient's SMTP server before sending an email. |
|
|
Term
What is an e-mail address? |
|
Definition
Globally unique ID and used to receive email. |
|
|
Term
What is a global reference to an Internet resource like a host, network or service which maps to IP address(es)? |
|
Definition
|
|
Term
Describe the structure of a Domain |
|
Definition
Has a hierarchical sequence of labels, separated by dots. |
|
|
Term
What is the top of the hierarchy of a Domain? |
|
Definition
On the right end of the sequence. |
|
|
Term
What is used for threading and aiding identification for duplications? |
|
Definition
|
|
Term
What is used for the purpose of message tracking? |
|
Definition
ENVelope Identifier (ENVID) |
|
|
Term
What are the two parts of an Email Message? |
|
Definition
|
|
Term
What can the body of an e-mail contain? |
|
Definition
Text, multimedia elements in Hyper Text Markup Language (HTML) and attachments encoded in Multi-Purpose Internet Mail Extensions (MIME). |
|
|
Term
What can include headers in a message? |
|
Definition
The sender or by a component of the e-mail system. |
|
|
Term
The header of an email is a structured set of fields that include what? |
|
Definition
‘From’, ‘To’, ‘Subject’, ‘Date’, ‘CC’, ‘BCC’, ‘Return-To’, etc. |
|
|
Term
The header of an email can also include what kind of information? |
|
Definition
|
|
Term
What refers to the study of source and content of e-mail message to find evidence? |
|
Definition
|
|
Term
What kind of evidence is searched for using email forensics? |
|
Definition
–identification of the actual sender, recipient, date and time when it was sent, etc.
–Finding the history of a message and identity of all involved entities.
–A forensic investigation of e-mail can examine both email header and body. |
|
|
Term
Email Forensics also includes the investigation of what? |
|
Definition
Some client or server computer suspected of being used or misused for e-mail forgery. |
|
|
Term
|
Definition
The investigation of meta data in the e-mail message in the form of control information contain information about the sender and/or the path along which the message has traversed. |
|
|
Term
What is Server Investigation? |
|
Definition
Copies of delivered emails and server logs are investigated to identify the source of an e-mail message. |
|
|
Term
What is Network Device Investigation? |
|
Definition
To investigate the source of an email message by investigating logs maintained by the network devices. |
|
|
Term
What Are Software Embedded Identifiers? |
|
Definition
Information about the creator of e-mail, attached files or documents may be included with the message by the e-mail software used by the sender for composing e-mail. |
|
|
Term
What Are Sender Mailer Fingerprints? |
|
Definition
Identification of software handling e-mail at server can be revealed from the Received header field and identification of software handling e-mail at client can be ascertained by using different set of headers like “X-Mailer” or equivalent. |
|
|
Term
What does the X-Mailer Line Do In The Email Header? |
|
Definition
Tells you what program was used to draft and send the original email. |
|
|
Term
|
Definition
|
|
Term
What is Sender Policy Framework? |
|
Definition
A simple email-validation system designed to detect email spoofing. |
|
|
Term
Where is the list of authorized sending hosts for a domain published? |
|
Definition
Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. |
|
|
Term
Email spam and phishing often use what kind of forged addresses? |
|
Definition
|
|
Term
|
Definition
DomainKeys Identified Mail |
|
|
Term
What is DomainKeys Identified Mail? |
|
Definition
Another email authentication method designed to detect email spoofing. |
|
|
Term
One can verify a DKIMs authenticity and the content integrity using what? |
|
Definition
Signer's public key published in the DNS. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Signatures of Heading and Body |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Canonicalization algorithm(s) for header and body |
|
|
Term
|
Definition
|
|
Term
|
Definition
Length of the canonicalized part of the body that has been signed. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
List of signed header fields, repeated for fields that occur multiple times. |
|
|