Term
Where does the majority of SPAM Come from? |
|
Definition
|
|
Term
What are some new techniques for spam? |
|
Definition
PDF/ MP3 Spam -> Combining HTML elements to fool users |
|
|
Term
What are the 6 desired email privacy enhancement services? |
|
Definition
Confidentiality Authentication Message integrity protection Non-repudiation Relaibility Security |
|
|
Term
What is the threat to reliability of email? |
|
Definition
|
|
Term
Name two real sources of threats for email |
|
Definition
|
|
Term
What does digitally signed mail provide (3) |
|
Definition
Proof secret key was used Proof of ID if secrey ks is signed Assurance that the message wasnt modified after it was sent |
|
|
Term
What does S/MIME stand for |
|
Definition
Secure Multipurpose internet mail extensions |
|
|
Term
What was MIME designed for? |
|
Definition
|
|
Term
What certificates does SMIME use |
|
Definition
|
|
Term
How do SMIME and PGP differ? |
|
Definition
SMIME uses CAs, PGP uses a web of trust |
|
|
Term
4 Techniques for email security |
|
Definition
Connection Filtering Address Filtering Content filtering Challenge / response |
|
|
Term
|
Definition
A list of addresses not allowed to receive email from |
|
|
Term
|
Definition
Receive an email Wait a while See if it's resent, if not then forward it |
|
|
Term
How does challenge / response work? |
|
Definition
Send an email to check if a user is real |
|
|