[Fwd: Do you Speak Geek: Securing the Internet's Most Pervasive App] | |
From: | Joe Klemmer |
Date: | Thu, 03 Mar 2005 14:53:36 -0500 |
Something to do that is actually both a diversion and targeted work related. -------- Original Message -------- Subject: Do you Speak Geek: Securing the Internet's Most Pervasive App Date: Thu, 03 Mar 2005 19:05:51 GMT From: Information Security magazineTo: klemmerj@webtrek.com Our quiz on encryption algorithms sent to subscribers last week was a huge hit...so we thought you'd find it helpful - and fun - as well! We won't be doing these every week, heck you're busy enough as it is and the last thing we want is to bother you with more email. But this is a great way to take a quick break from your day for an enlightening security quiz. Today's topic: Securing your organization's e-mail application. No doubt about it, e-mail is the most widely used computer application. Unfortunately, security isn't a byproduct of popularity. Simply click on the links below to test your e-mail security smarts. Answers are posted on SearchSecurity.com. 1. What is a secure method of sending e-mail that uses the RSA encryption system? Answer: http://searchSecurity.com/r/0,,38404,00.htm?track=NL-347&ad=506893 2. What is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message? Answer: http://searchSecurity.com/r/0,,38405,00.htm?track=NL-347&ad=506893 3. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox? Answer: http://searchSecurity.com/r/0,,38406,00.htm?track=NL-347&ad=506893 4. What is the name for Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits? Answer: http://searchSecurity.com/r/0,,38407,00.htm?track=NL-347&ad=506893 5. What document must end-users agree to follow in order to be provided with access to a network and its applications, including e-mail? Answer: http://searchSecurity.com/r/0,,38408,00.htm?track=NL-347&ad=506893 6. What type of scam involves the sending of legitimate-looking e-mails appearing to come from some of the Web's biggest sites in an effort to gather personal and financial information from the recipient? Answer: http://searchSecurity.com/r/0,,38409,00.htm?track=NL-347&ad=506893 7. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database? Answer: http://searchSecurity.com/r/0,,38410,00.htm?track=NL-347&ad=506893 8. What protocol ensures privacy between communicating applications and their users on the Internet? Answer: http://searchSecurity.com/r/0,,38411,00.htm?track=NL-347&ad=506893 9. What term describes the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source? Answer: http://searchSecurity.com/r/0,,38412,00.htm?track=NL-347&ad=506893 10. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document? Answer: http://searchSecurity.com/r/0,,38413,00.htm?track=NL-347&ad=506893 How'd you do? Let us know: mailto:lprevite@techtarget.com 9-10 correct: E-mail excellence 6-8 correct: E-mail expert 3-5 correct: E-mail amateur 0-2 correct: Return to sender LEARN MORE ABOUT E-MAIL SECURITY: Learn the ten steps to a holistic secure messaging strategy. http://searchSecurity.com/r/0,,38414,00.htm?track=NL-347&ad=506893 Download Chapter 3, Understanding and Preventing Spam, from Kevin Beaver's "The Definitive Guide to E-mail Management and Security." http://searchSecurity.com/r/0,,38415,00.htm?track=NL-347&ad=506893 Balance the pros and cons of outsourcing antivirus services before handing over the keys to your kingdom. http://searchSecurity.com/r/0,,38416,00.htm?track=NL-347&ad=506893 TAKE OUR OTHER QUIZZES: Test your knowledge of authentication methods. http://searchSecurity.com/r/0,,38417,00.htm?track=NL-347&ad=506893 Put your knowledge of the vulnerability management process on the line. http://searchSecurity.com/r/0,,38418,00.htm?track=NL-347&ad=506893 ____________________________________________________________________ To unsubscribe from this newsletter, reply to this e-mail with REMOVE in the Subject line. Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: TechTarget Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494