Loading

Module 1: Computer Security and Privacy

Notes
Study Reminders
Support
Text Version

2.5 Measures for Securing E-Mail and Instant Messaging Video 2

Set your study reminders

We will email you at these times to remind you to study.
  • Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +

Measures for Securing E-Mail and Instant Messaging Video 2
*
*
* [Show Transcript] DO NOT RESPOND TO UNSOLICITED COMMERCIAL MAIL.


You may receive a number of unwanted e-mail messages from unknown senders
including individuals and companies that are advertising their products or
services. These messages may also be in the form of online surveys that
require you to fill up personal information. These unsolicited messages are
known as junk mail or spam.

Junk mail can often include content that is harmful for your computer. In
addition, junk mail is often used for stealing identities, and you might
accidentally share sensitive information while responding to such messages.
Therefore, you should avoid replying to junk mail. You should also delete
junk mail whenever you receive it. E-mail programs, such as Windows Mail,
include a junk mail folder to which the junk mail may be directed and later
deleted. GLOSSARY

-------------------------
A

Active Content

Small program that gets installed on a computer while browsing the
Internet. The basic function of active content is to provide an interactive
Internet experience through videos and toolbars. Sometimes, active content
is used to gain unauthorized access to a computer, and then damage the data
stored on it or install malicious software on it.
-------------------------
B

Back Up

To make a duplicate copy of a program, a disk, or data. The duplicate copy
is called a backup.
-------------------------
C

Cache Memory

Temporary memory on your computer that is sometimes used to store local
copies of files opened when you browse the Internet.

Computer Privacy

Keeping a user