Your SlideShare is downloading. ×
Electronic Communication Investigate
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Electronic Communication Investigate

225

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
225
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ELECTRONIC COMMUNICATION INVESTIGATE Brain Young Block4 March, 5
  • 2. ARPANET
    • ARPANET ( Advanced Research Projects Agency Network ) developed by ARPA of the United States Department of Defense during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet.
  • 3. HARD & SOFT BOUNCE
    • A soft bounce is an email message that gets as far as the recipient's mail server (it recognizes the address) but is bounced back undelivered before it gets to the intended recipient.
    • A hard bounce is an email message that has been returned to the sender and is permanently undeliverable.
  • 4. COMPUTER SPAM
    • Annoying messages or advertisements that flood your computer when accessing the internet or using e-mail.
  • 5. INTERNET AND INTRANET
    • There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space. An intranet may be accessible from the Internet, but as a rule it's protected by a password and accessible only to employees or other authorized
  • 6. POP
    • Post Office Protocol version 3 ( POP3 ) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP3 and IMAP4 (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-mail clients and servers support both.
  • 7. PHISHING
    • In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
  • 8. ENCRYPTION AND DECRYPTION
    • In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process.
  • 9. NETIQUETTE
    • Netiquette , a portmanteau of "internet etiquette", is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums.
  • 10. ROUTER
    • A router is a networking device whose software and hardware are usually tailored to the tasks of routing and forwarding information. For example, on the Internet, information is directed to various paths by routers.

×