Loading

Module 1: Computer Security and Privacy

Notes
Study Reminders
Support
Text Version

2.6 Measures for Securing E-Mail and Instant Messaging Video 3

Set your study reminders

We will email you at these times to remind you to study.
  • Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +

Measures for Securing E-Mail and Instant Messaging Video 3
*
*
* [Show Transcript] PROTECT YOURSELF FROM PHISHING.

Phishing is a common activity used to extract personal information from
computer users and then use the information for malicious purposes. For
example, someone sends e-mail messages to you, pretending to be from a bank
or any other trustworthy organization, and asks for sensitive information,
such as credit card number or password. This information is either sold
further or used to cause financial loss to you. Therefore, you must verify
the authenticity of such e-mail messages before responding with any
personal information.

Such e-mail messages are used by various phishing Web sites on the
Internet to collect your personal information. Internet Explorer 7 includes
the Microsoft Phishing Filter feature that runs in the background while you
browse the Internet and helps detect phishing Web sites. GLOSSARY


-------------------------
A

Active Content

Small program that gets installed on a computer while browsing the
Internet. The basic function of active content is to provide an interactive
Internet experience through videos and toolbars. Sometimes, active content
is used to gain unauthorized access to a computer, and then damage the data
stored on it or install malicious software on it.
-------------------------
B

Back Up

To make a duplicate copy of a program, a disk, or data. The duplicate copy
is called a backup.
-------------------------
C

Cache Memory

Temporary memory on your computer that is sometimes used to store local
copies of files opened when you browse the Internet.

Computer Privacy

Keeping a user