Measures for Securing E-Mail and Instant Messaging Video 3
* [Show Transcript] PROTECT YOURSELF FROM PHISHING.
Phishing is a common activity used to extract personal information from
computer users and then use the information for malicious purposes. For
example, someone sends e-mail messages to you, pretending to be from a bank
or any other trustworthy organization, and asks for sensitive information,
such as credit card number or password. This information is either sold
further or used to cause financial loss to you. Therefore, you must verify
the authenticity of such e-mail messages before responding with any
Such e-mail messages are used by various phishing Web sites on the
Internet to collect your personal information. Internet Explorer 7 includes
the Microsoft Phishing Filter feature that runs in the background while you
browse the Internet and helps detect phishing Web sites. GLOSSARY
Small program that gets installed on a computer while browsing the
Internet. The basic function of active content is to provide an interactive
Internet experience through videos and toolbars. Sometimes, active content
is used to gain unauthorized access to a computer, and then damage the data
stored on it or install malicious software on it.
To make a duplicate copy of a program, a disk, or data. The duplicate copy
is called a backup.
Temporary memory on your computer that is sometimes used to store local
copies of files opened when you browse the Internet.
Keeping a user
Log in to save your progress and obtain a certificate in Alison’s free Microsoft Digital Literacy - IT Basics, Internet & Productivity Programs online course
Sign up to save your progress and obtain a certificate in Alison’s free Microsoft Digital Literacy - IT Basics, Internet & Productivity Programs online course
Please enter you email address and we will mail you a link to reset your password.