• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Email and Email Security.

Extracts from this document...


Email Email, Or Electronic Mail, Is Becoming More And More Popular As People Learn To Communicate Again With Written Words. For Many Purposes It Is Superior To A Phone Call Because You Don't Have To Catch The Person In And You Can Get Straight To The Point. No Time Is Wasted On Casual Conversation. It Also Leaves A Written Record To Refer Back To For A Response Or If You Forget Who Said What. Email Is Superior To The Traditional Office Memo Because It Uses No Paper (Save The Trees!!) And It Can Be Sent To A Whole List Of People Instantly. Purpose: Transmitting Messages Between Computer Users Major Advantage: Speed For Communication And The Lower Cost . Major Disadvantage: You Don't Know If The Receiver Actually Reads It, Though You Can Find Out If They Received It. Of Course In A Phone Conversation You Don't Really Know If The Person Is Actually Listening Either! With No Body Language Or Vocal Intonations It Is Difficult To Convey The Emotional Tone You Want. Introduction to Email Security Today email is so widely used that it has become the default means of communication where the correspondents feel that they can discuss matters that can be kept between them. ...read more.


SSL is a transport-layer protocol developed to secure TCP/IP-based protocols such as Internet Message Access Protocol (IMAP), Post Office Protocol (POP), and, of course, HTTP. By applying SSL technology to email, secure email becomes as easy to secure as web browsing. Email Security Guidelines 1) Receiving Email With Attachments a) Unsafe File Types. Never Open Any Email Attachment With Any Of The Following File Extensions: File .Bat File.Com File.Exe File.Vbs b) Unknown File Types. Never Open Any Email Attachment Or Internal Email Link With A File-Type Extension You Do Not Recognize. c) Microsoft Document Types. Never Open Any Email Attachment Or Internal Email Link With A Recognized Microsoft Document Type (E.G., .Doc, .Xls, .Ppt) Even From Someone You Know And Trust Without First Running An Updated Virus Scan Program On It. d) Ask For Plain Text. If You Receive A .Doc, .Wpd, .Xls Or Or Other Unsafe File Type As An Attachment, Even From Someone You Know, Ask Them If They Will Convert It To .Rtf, .Txt Or .Cvs And Then Resend It To You. Then Delete The Original Email And Attachment. ...read more.


Don't run programs of unknown origin b) Turn off your computer or disconnect from the network when not in use Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network c) Disable Java, JavaScript, and ActiveX if possible. Make regular backups of critical data: Keep a copy of important files on removable media such as ZIP disks or recordable CD-ROM disks (CD-R or CD-RW disks). Use software backup tools if available, and store the backup disks somewhere away from the computer. d) Make a boot disk in case your computer is damaged or compromised To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred. Remember, however, you must create this disk before you have a security event. Finally for email security I will remember all to follow the Email Security Guidelines because you don't know what kind of information will be in you computer and the important of it and don't know who want the get information for your computer and who will used it. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report explains a number of benefits and drawbacks regrading e-mail accounts. In addition, the report contains a good list of measures to undertake. However the background information on 'Secure Your Communication E-mail' is lacking detail and doesn't ...

Read full review

Response to the question

In summary, the report explains a number of benefits and drawbacks regrading e-mail accounts. In addition, the report contains a good list of measures to undertake. However the background information on 'Secure Your Communication E-mail' is lacking detail and doesn't explain what each point means.The report states one major benefit and one major drawback, this is quite good. As this allows the examiner to understand the key advantage and the key disadvantage. The student briefly talks about securing the e-mail account by using a 'Gateway', however the student doesn't describe what is meant by this. The examiner would still be wondering how this applies to securing an e-mail account. The list of 'Email Security Guidelines' are quite good. As these bullet points haven't listed a brief understanding. The student has justified the reason to why the measure should be undertake to prevent against any attack via e-mail. This section will gain the student high marks.

Level of analysis

The report states how using e-mails could place the user at an disadvantage if there receive a virus via e-mail. Further more the report states how 'The Melissa' virus was spread. Using this example/case study is good, as this shows relevant understanding of a real situation. However for high marks, the report could show a screenshot of what an e-mail will look like, with this virus within the message. This would allow the examiner to visualize the report.

Quality of writing

The report states the term 'E-Mail' and explains this means 'Electronic Mail', however the report hasn't given a description of what an e-mail account is and how this is used as a means of communication between a number of people. This would make a good introduction for the report, however this isn't contained within the report. The sub-sections title's could be in Bold, as the report states 'Introduction To Email Security', I didn't notice that this was a new section at first. Thus, it's important to clearly separate the report using clear sub-titles.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 22/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Marked by a teacher

    ICT Evaluation of my materials produced for a "Get Moving" health campaign.

    4 star(s)

    are doing exceptionally well and think that they can also do the same. To make the graph seem more ?alive? I could?ve used a colour which contrasted with the colour green to make it stand out for example the colour red.

  2. Internal and external methods of communications for Marks and Spencer's.

    Also other communication has been handy for them like E-mail, which is becoming more and more common as people are starting to use it. Also mobile phones have become common this is also a new type of technology as every has got one even kids carry them around as it is a quick method of talking to a person.

  1. Report On Communication Systems To the Board of Directors of Cadburys

    of the company, location of raw materials, transport and communication links and labour supply. This firm uses a lot of raw materials so the reason they have moved could be because they want to move closer to their suppliers which will lower the cost of transporting the raw materials.

  2. Computers: Are they an advantage or a disadvantage for young people?

    cheap and easy, it can make your work more presentable and helps with writing and finally it opens you up to a lot of information via the internet which can help with schoolwork to obtain a higher grade in assignments or essays.

  1. Uses of ICT.

    Disadvantages are things like the phone line can't always get a connection to the internet. Sometimes phones cannot be accessed if the number is busy or has a fault. Fax machines; - are connected to a normal phone line, a fax machine allows you to transmit pieces of paper to someone else instantly.

  2. ICT Systems in Everyday Life: Your Local Community

    and linking customers to quality organisations who can meet their specific requirements. Realising that the average person, When they begin to look into CCTV, has little way of knowing where to find expert advice at reasonable cost. CCTV has proved to be an effective and versatile tool in helping to combat criminal activity and other anti-social behaviour.

  1. ICT in Communication

    Teleconferencing allows people in different physical locations to exchange ideas and information interactively using either the telephone or e-mail. This means that GAP can carry out meetings with a number of superstore by using ICT to communicate with them. They use these communication methods often to discuss important business issues.

  2. Free essay

    Impact of ICT in Community

    The software meets Mary needs she can contact her family and friends using the MSN the software helps her as she can feedbacks the software talks to you as you're having a conversion with another person. She can also use to check her emails and reply back.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work