Wednesday, 19 September 2012

Electronic Mail and Risks

Electronic Mail (Email)
This was very early online technology. To use email you need to have a connection to an email server also you will require an email client. An email client is a program that is on your computer that is connected to the internet, such a program called Outlook Express. However these clients can also be run through the internet aswell, sites such as hotmail or yahoo. Email is also readily available on all smartphones nowadays, it can even be used through smart TV's have internet capabilities. Email systems allow you to see who has sent you mail and also what the content of the email is. It can also allow you to compose mail and send it tro anyone that you want if you have their email address. Another useful perk is that you can attatch documents and media files for the person your sending it to see.

The message is started in an editing view. messages are ususally sent using Simple Mail Transfer Protocol-port 25(SMTP). Ususally they are recieved using post office protocol-port 110 (POP3) or an Internet Mail Access Protocol-port 143 (IMAP) server. With advantages it comes with disadvantages like email is often misused and even at a simple level people send inapproriate messages. Viruses, trojans and worms can easily be attatched.

Risks
Spoofing and Spamming -  It is fairly easy for an ordinary person to create a program that is given a fake address in the 'form' of an email. This makes the reciever to believe it is trusted and a decent source. Spoofing is sending mail that is someone of the incorrect identity and Spamming is using email to conduct a junk mail campaigne.
Virus - This is different to spamming and spoofing, this is actually a harmful piece of code that can damage a computer because it attaches itself to programs and files. e.g. When a file is opened it can be spread further because it can replicate itself in that file like a biological virus.
Worm - Unlike a virus this piece of coding can actually spread itself with out the assistance of the computers user. A result of this being their creaters can possibly control your computer remotely.
Trojan - This is like a virus in the way that it has a code but it is named after a Tojan Horse. The reason for this is because it is ususally disguised as an innocent document or an attractive attachment but really it contains a nasty surprise when you open it. When it has finished installing it can cause serious damage to a users computer but also it will almost definately take control of the users machine.

No comments:

Post a Comment