Electronic Communication Investigate

335 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
335
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Electronic Communication Investigate

  1. 1. ELECTRONIC COMMUNICATION INVESTIGATE Brain Young Block4 March, 5
  2. 2. ARPANET <ul><li>ARPANET ( Advanced Research Projects Agency Network ) developed by ARPA of the United States Department of Defense during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet. </li></ul>
  3. 3. HARD & SOFT BOUNCE <ul><li>A soft bounce is an email message that gets as far as the recipient's mail server (it recognizes the address) but is bounced back undelivered before it gets to the intended recipient. </li></ul><ul><li>A hard bounce is an email message that has been returned to the sender and is permanently undeliverable. </li></ul>
  4. 4. COMPUTER SPAM <ul><li>Annoying messages or advertisements that flood your computer when accessing the internet or using e-mail. </li></ul>
  5. 5. INTERNET AND INTRANET <ul><li>There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space. An intranet may be accessible from the Internet, but as a rule it's protected by a password and accessible only to employees or other authorized </li></ul>
  6. 6. POP <ul><li>Post Office Protocol version 3 ( POP3 ) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP3 and IMAP4 (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-mail clients and servers support both. </li></ul>
  7. 7. PHISHING <ul><li>In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication </li></ul>
  8. 8. ENCRYPTION AND DECRYPTION <ul><li>In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process. </li></ul>
  9. 9. NETIQUETTE <ul><li>Netiquette , a portmanteau of &quot;internet etiquette&quot;, is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. </li></ul>
  10. 10. ROUTER <ul><li>A router is a networking device whose software and hardware are usually tailored to the tasks of routing and forwarding information. For example, on the Internet, information is directed to various paths by routers. </li></ul>

×