Mailinglist Archive
| [Fwd: Do you Speak Geek: Securing the Internet's Most Pervasive App]
|
| From: | Joe Klemmer |
| Date: | Thu, 03 Mar 2005 14:53:36 -0500
|
Something to do that is actually both a diversion and targeted work
related.
-------- Original Message --------
Subject: Do you Speak Geek: Securing the Internet's Most Pervasive App
Date: Thu, 03 Mar 2005 19:05:51 GMT
From: Information Security magazine
To: klemmerj@webtrek.com
Our quiz on encryption algorithms sent to subscribers last week was a
huge hit...so we thought you'd find it helpful - and fun - as well!
We won't be doing these every week, heck you're busy enough as it is
and the last thing we want is to bother you with more email. But this
is a great way to take a quick break from your day for an
enlightening security quiz.
Today's topic: Securing your organization's e-mail application.
No doubt about it, e-mail is the most widely used computer
application. Unfortunately, security isn't a byproduct of popularity.
Simply click on the links below to test your e-mail security smarts.
Answers are posted on SearchSecurity.com.
1. What is a secure method of sending e-mail that uses the RSA
encryption system?
Answer: http://searchSecurity.com/r/0,,38404,00.htm?track=NL-347&ad=506893
2. What is e-mail that has been directed to a recipient through a
third-party server that does not identify the originator of the
message?
Answer: http://searchSecurity.com/r/0,,38405,00.htm?track=NL-347&ad=506893
3. What do you call a program used to detect unsolicited and unwanted
e-mail and prevents those messages from getting to a user's inbox?
Answer: http://searchSecurity.com/r/0,,38406,00.htm?track=NL-347&ad=506893
4. What is the name for Microsoft's proposed e-mail sender
authentication protocol designed to protect against domain spoofing
and phishing exploits?
Answer: http://searchSecurity.com/r/0,,38407,00.htm?track=NL-347&ad=506893
5. What document must end-users agree to follow in order to be
provided with access to a network and its applications, including
e-mail?
Answer: http://searchSecurity.com/r/0,,38408,00.htm?track=NL-347&ad=506893
6. What type of scam involves the sending of legitimate-looking
e-mails appearing to come from some of the Web's biggest sites in an
effort to gather personal and financial information from the
recipient?
Answer: http://searchSecurity.com/r/0,,38409,00.htm?track=NL-347&ad=506893
7. What is the term for an attempt to determine the valid e-mail
addresses associated with an e-mail server so that they can be added
to a spam database?
Answer: http://searchSecurity.com/r/0,,38410,00.htm?track=NL-347&ad=506893
8. What protocol ensures privacy between communicating applications
and their users on the Internet?
Answer: http://searchSecurity.com/r/0,,38411,00.htm?track=NL-347&ad=506893
9. What term describes the forgery of an e-mail header so that the
message appears to have originated from someone or somewhere other
than the actual source?
Answer: http://searchSecurity.com/r/0,,38412,00.htm?track=NL-347&ad=506893
10. What is the name for a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document?
Answer: http://searchSecurity.com/r/0,,38413,00.htm?track=NL-347&ad=506893
How'd you do? Let us know: mailto:lprevite@techtarget.com
9-10 correct: E-mail excellence
6-8 correct: E-mail expert
3-5 correct: E-mail amateur
0-2 correct: Return to sender
LEARN MORE ABOUT E-MAIL SECURITY:
Learn the ten steps to a holistic secure messaging strategy.
http://searchSecurity.com/r/0,,38414,00.htm?track=NL-347&ad=506893
Download Chapter 3, Understanding and Preventing Spam, from Kevin
Beaver's "The Definitive Guide to E-mail Management and Security."
http://searchSecurity.com/r/0,,38415,00.htm?track=NL-347&ad=506893
Balance the pros and cons of outsourcing antivirus services before
handing over the keys to your kingdom.
http://searchSecurity.com/r/0,,38416,00.htm?track=NL-347&ad=506893
TAKE OUR OTHER QUIZZES:
Test your knowledge of authentication methods.
http://searchSecurity.com/r/0,,38417,00.htm?track=NL-347&ad=506893
Put your knowledge of the vulnerability management process on the
line.
http://searchSecurity.com/r/0,,38418,00.htm?track=NL-347&ad=506893
____________________________________________________________________
To unsubscribe from this newsletter, reply to this e-mail with REMOVE
in the Subject line.
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494