• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Email and Email Security.

Extracts from this document...


Email Email, Or Electronic Mail, Is Becoming More And More Popular As People Learn To Communicate Again With Written Words. For Many Purposes It Is Superior To A Phone Call Because You Don't Have To Catch The Person In And You Can Get Straight To The Point. No Time Is Wasted On Casual Conversation. It Also Leaves A Written Record To Refer Back To For A Response Or If You Forget Who Said What. Email Is Superior To The Traditional Office Memo Because It Uses No Paper (Save The Trees!!) And It Can Be Sent To A Whole List Of People Instantly. Purpose: Transmitting Messages Between Computer Users Major Advantage: Speed For Communication And The Lower Cost . Major Disadvantage: You Don't Know If The Receiver Actually Reads It, Though You Can Find Out If They Received It. Of Course In A Phone Conversation You Don't Really Know If The Person Is Actually Listening Either! With No Body Language Or Vocal Intonations It Is Difficult To Convey The Emotional Tone You Want. Introduction to Email Security Today email is so widely used that it has become the default means of communication where the correspondents feel that they can discuss matters that can be kept between them. ...read more.


SSL is a transport-layer protocol developed to secure TCP/IP-based protocols such as Internet Message Access Protocol (IMAP), Post Office Protocol (POP), and, of course, HTTP. By applying SSL technology to email, secure email becomes as easy to secure as web browsing. Email Security Guidelines 1) Receiving Email With Attachments a) Unsafe File Types. Never Open Any Email Attachment With Any Of The Following File Extensions: File .Bat File.Com File.Exe File.Vbs b) Unknown File Types. Never Open Any Email Attachment Or Internal Email Link With A File-Type Extension You Do Not Recognize. c) Microsoft Document Types. Never Open Any Email Attachment Or Internal Email Link With A Recognized Microsoft Document Type (E.G., .Doc, .Xls, .Ppt) Even From Someone You Know And Trust Without First Running An Updated Virus Scan Program On It. d) Ask For Plain Text. If You Receive A .Doc, .Wpd, .Xls Or Or Other Unsafe File Type As An Attachment, Even From Someone You Know, Ask Them If They Will Convert It To .Rtf, .Txt Or .Cvs And Then Resend It To You. Then Delete The Original Email And Attachment. ...read more.


Don't run programs of unknown origin b) Turn off your computer or disconnect from the network when not in use Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network c) Disable Java, JavaScript, and ActiveX if possible. Make regular backups of critical data: Keep a copy of important files on removable media such as ZIP disks or recordable CD-ROM disks (CD-R or CD-RW disks). Use software backup tools if available, and store the backup disks somewhere away from the computer. d) Make a boot disk in case your computer is damaged or compromised To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred. Remember, however, you must create this disk before you have a security event. Finally for email security I will remember all to follow the Email Security Guidelines because you don't know what kind of information will be in you computer and the important of it and don't know who want the get information for your computer and who will used it. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report explains a number of benefits and drawbacks regrading e-mail accounts. In addition, the report contains a good list of measures to undertake. However the background information on 'Secure Your Communication E-mail' is lacking detail and doesn't ...

Read full review

Response to the question

In summary, the report explains a number of benefits and drawbacks regrading e-mail accounts. In addition, the report contains a good list of measures to undertake. However the background information on 'Secure Your Communication E-mail' is lacking detail and doesn't explain what each point means.The report states one major benefit and one major drawback, this is quite good. As this allows the examiner to understand the key advantage and the key disadvantage. The student briefly talks about securing the e-mail account by using a 'Gateway', however the student doesn't describe what is meant by this. The examiner would still be wondering how this applies to securing an e-mail account. The list of 'Email Security Guidelines' are quite good. As these bullet points haven't listed a brief understanding. The student has justified the reason to why the measure should be undertake to prevent against any attack via e-mail. This section will gain the student high marks.

Level of analysis

The report states how using e-mails could place the user at an disadvantage if there receive a virus via e-mail. Further more the report states how 'The Melissa' virus was spread. Using this example/case study is good, as this shows relevant understanding of a real situation. However for high marks, the report could show a screenshot of what an e-mail will look like, with this virus within the message. This would allow the examiner to visualize the report.

Quality of writing

The report states the term 'E-Mail' and explains this means 'Electronic Mail', however the report hasn't given a description of what an e-mail account is and how this is used as a means of communication between a number of people. This would make a good introduction for the report, however this isn't contained within the report. The sub-sections title's could be in Bold, as the report states 'Introduction To Email Security', I didn't notice that this was a new section at first. Thus, it's important to clearly separate the report using clear sub-titles.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 22/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Marked by a teacher

    ICT Evaluation of my materials produced for a "Get Moving" health campaign.

    4 star(s)

    Digital poster My digital poster is suited to my target audience as it appeals to teenagers by using a simple layout, basic colours and using key points of information instead of large paragraphs of information. The purpose of the digital poster is to advertise and promote Get Up, Get Moving

  2. The Impact of ICT on society.

    Though it had some starting faults it has had its benefits and traffic control as a whole has benefited or the government says so. Traveling abroad is run by computers and location systems have been essentially created for this industry.

  1. Internal and external methods of communications for Marks and Spencer's.

    Also other communication has been handy for them like E-mail, which is becoming more and more common as people are starting to use it. Also mobile phones have become common this is also a new type of technology as every has got one even kids carry them around as it is a quick method of talking to a person.

  2. Uses of ICT.

    Disadvantages are that the signal isn't always clear. There are so many stations that there is no longer room for anymore to be made. Satellite, cable and digital; - are different ways of viewing programs. Digital provides a wide range of channels through a 'dish' that is attached to the outside wall of your house.

  1. OCR GCSE Business & Communication Task 7 Report

    All these issues remain solvable as I have incorporated them into my work and established pleasing elements to insure my company stays positive and professional. Task 1c: Complements Slip & Business Card Software: For my progress within making a complements slip and business I used Microsoft Publish and Microsoft Word respectively.

  2. ICT Systems in Everyday Life: Your Local Community

    and linking customers to quality organisations who can meet their specific requirements. Realising that the average person, When they begin to look into CCTV, has little way of knowing where to find expert advice at reasonable cost. CCTV has proved to be an effective and versatile tool in helping to combat criminal activity and other anti-social behaviour.

  1. A report on how ICT affects me as an individual, and other members of ...

    Advantages are that they are fast easy and effective. Disadvantages are that some of the page(s) may be cut off. The ink cartridges may run out and may only copy half of the document. Images that are copied from colour into black and white may be dark or not very clear once printed.

  2. Get Up,Get Moving Evaluation of my multimedia promotions of a fitness campaign.

    I added in a transition between every slide so it was more fluent and the transfers were smooth and so they looked professional. I created my own hyperlinked buttons so I could move between slides with ease, this was an easy way of making the quiz look professional, I made

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work