Chapter 11 & 12 Flashcards
phishing
e-mails contain links to text on a Web page
Spear phishing
Targets a specific individual or group in an organization. Goals steal login credentials, trade secrets, financial documents, event details.
Whaling-Phishing
Targets executive level employees in an organization. Often accomplished through social engineering. Goals get target to authorize wire transfers, provide login credentials, divulge sensitive information.
Smishing
Fraudulent text messages meant to trick a person into revealing sensitive data or clicking on a malicious link
Vishing
Fraudulent phone calls that induce a person to provide personal information or give remote access to their computer.
Pharming
DNS poisoning takes user to a fake site
Spoofing
A technique used in spam and phishing attacks to trick a user
into thinking the email came for an person or entity they know an trust.
BEC
Business email compromise. A legitimate email account is taken
over. Fraudulent messages sent from the legitimate email account to trick someone into sending money or divulging sensitive info.
Enhanced/Extended Simple Mail Transfer Protocol (ESMTP)
number in the message’s header to check for legitimacy of email. Reasons for email being bounced – Error codes can be looked up.
applicable privacy laws
Electronic Communications Privacy Act (ECPA) and the Stored
Communications Act (SCA) apply to e-mail
Forensic Linguistics
Where language and law intersect
Examining E-mail Messages
-Find and copy any potential evidence
* Access protected or encrypted material
* Print e-mails
Viewing E-mail headers
GUI clients
Web-based clients
After you open e-mail headers, copy and paste them into a text document
* So that you can read them with a text editor
Information contained in headers?
-The main piece of information you’re looking for is the originating e-mail’s IP address
* Date and time the message was sent
* Filenames of any attachments
* Unique message number (if supplied)
Tracing
Determining message origin