Term
| Email System Architecture |
|
Definition
Client
MSA
Transmitter
Internet
Receiver
MDA <> Mailstore
Client (POP, IMAP) or Browser (HTTP) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Mail Storage and Delivery Agent |
|
|
Term
| What is a computer program for reading and sending e-mails? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Post Office Protocol Server |
|
|
Term
| What is the Post Office Protocol Sever? |
|
Definition
| Popular email protocol used to deliver message from a mail server. |
|
|
Term
|
Definition
| Internet Message Access Protocol Server |
|
|
Term
| What is the difference between POP3 and IMAP? |
|
Definition
POP3 by default the message in server is deleted.
IMAP messages stay in the server even after access and users can arrange emails into folders. |
|
|
Term
|
Definition
| Simple Mail Transfer Protocol Server |
|
|
Term
| What is a Simple Mail Transfer Protocol Server? |
|
Definition
| An outgoing email server with a push protocol that first consults DNS to find IP address of the recipient's SMTP server before sending an email. |
|
|
Term
| What is an e-mail address? |
|
Definition
| Globally unique ID and used to receive email. |
|
|
Term
| What is a global reference to an Internet resource like a host, network or service which maps to IP address(es)? |
|
Definition
|
|
Term
| Describe the structure of a Domain |
|
Definition
| Has a hierarchical sequence of labels, separated by dots. |
|
|
Term
| What is the top of the hierarchy of a Domain? |
|
Definition
| On the right end of the sequence. |
|
|
Term
| What is used for threading and aiding identification for duplications? |
|
Definition
|
|
Term
| What is used for the purpose of message tracking? |
|
Definition
| ENVelope Identifier (ENVID) |
|
|
Term
| What are the two parts of an Email Message? |
|
Definition
|
|
Term
| What can the body of an e-mail contain? |
|
Definition
| Text, multimedia elements in Hyper Text Markup Language (HTML) and attachments encoded in Multi-Purpose Internet Mail Extensions (MIME). |
|
|
Term
| What can include headers in a message? |
|
Definition
| The sender or by a component of the e-mail system. |
|
|
Term
| The header of an email is a structured set of fields that include what? |
|
Definition
| ‘From’, ‘To’, ‘Subject’, ‘Date’, ‘CC’, ‘BCC’, ‘Return-To’, etc. |
|
|
Term
| The header of an email can also include what kind of information? |
|
Definition
|
|
Term
| What refers to the study of source and content of e-mail message to find evidence? |
|
Definition
|
|
Term
| What kind of evidence is searched for using email forensics? |
|
Definition
–identification of the actual sender, recipient, date and time when it was sent, etc.
–Finding the history of a message and identity of all involved entities.
–A forensic investigation of e-mail can examine both email header and body. |
|
|
Term
| Email Forensics also includes the investigation of what? |
|
Definition
| Some client or server computer suspected of being used or misused for e-mail forgery. |
|
|
Term
|
Definition
| The investigation of meta data in the e-mail message in the form of control information contain information about the sender and/or the path along which the message has traversed. |
|
|
Term
| What is Server Investigation? |
|
Definition
| Copies of delivered emails and server logs are investigated to identify the source of an e-mail message. |
|
|
Term
| What is Network Device Investigation? |
|
Definition
| To investigate the source of an email message by investigating logs maintained by the network devices. |
|
|
Term
| What Are Software Embedded Identifiers? |
|
Definition
| Information about the creator of e-mail, attached files or documents may be included with the message by the e-mail software used by the sender for composing e-mail. |
|
|
Term
| What Are Sender Mailer Fingerprints? |
|
Definition
| Identification of software handling e-mail at server can be revealed from the Received header field and identification of software handling e-mail at client can be ascertained by using different set of headers like “X-Mailer” or equivalent. |
|
|
Term
| What does the X-Mailer Line Do In The Email Header? |
|
Definition
| Tells you what program was used to draft and send the original email. |
|
|
Term
|
Definition
|
|
Term
| What is Sender Policy Framework? |
|
Definition
| A simple email-validation system designed to detect email spoofing. |
|
|
Term
| Where is the list of authorized sending hosts for a domain published? |
|
Definition
| Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. |
|
|
Term
| Email spam and phishing often use what kind of forged addresses? |
|
Definition
|
|
Term
|
Definition
| DomainKeys Identified Mail |
|
|
Term
| What is DomainKeys Identified Mail? |
|
Definition
| Another email authentication method designed to detect email spoofing. |
|
|
Term
| One can verify a DKIMs authenticity and the content integrity using what? |
|
Definition
| Signer's public key published in the DNS. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Signatures of Heading and Body |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Canonicalization algorithm(s) for header and body |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Length of the canonicalized part of the body that has been signed. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| List of signed header fields, repeated for fields that occur multiple times. |
|
|