Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please don’t copy from the same site and No copy from any source. The work shoul

ID: 3737450 • Letter: P

Question

Please don’t copy from the same site and  No copy from any source. The work should be your own words and answer. And please don’t answers be handwriting

Email is the most preferred way of communication in many sectors currently. Apart from its advantages in communication, emails are also prone to cause various threats to the information technology framework. Explain in the various threats (at least 4) of emails being sent over the internet or a network, and the techniques (at least 4) to protect the messages sent over emails.

Explanation / Answer

Answer:

The common threats of emails are

SPAM,

SPOOFING

PHISHING

Spam:

Email spam, also known as junk email, is unsolicited bulk messages sent through email.Spam’ is an acronym derived from the words ‘spiced’ and ‘ham’.spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

Spam causes a number of issues

Network congestion

Distraction and clutter

Malware

SPOOFING:

Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. It is occurs when an attacker sends you an e-mail pretending to be someone you know.Spoofing is analogous to sending a letter to someone and forging the return address on the envelope. Unfortunately, e-mail spoofing is easy to do, and very difficult to trace to its real sender.

wo basic reasons people (and machines) spoof:

1. Malicious: To cause useless internet traffic - ultimately hoping to bog down servers or bring them to a halt.

2. Because you were unlucky enough to have clicked the wrong thing at the wrong time.

PHISHING:

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

. Most phishing e-mails purport to be from a banking or other financial institution (as well as Web sites such as PayPal), and every once in a while they get lucky and actually send an e-mail pretending to be from your bank.

Phishing e-mails appear very authentic, and often include graphics and logos that are actually from your bank. There may even be a link that actually takes you to your bank’s Web site.

The following illustrates a common phishing scam attempt:

techniques to protect:

->The mitigation against spam is to use a spam filter.you dont have a spam filter then you can use any junk mail filtering options available in your e-mail software

->Never click an unexpected link or download an unfamiliar attachment

->Learn to read email message headers and check domain names and IP addresses.

->