• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Email and Email Security.

Extracts from this document...

Introduction

Email Email, Or Electronic Mail, Is Becoming More And More Popular As People Learn To Communicate Again With Written Words. For Many Purposes It Is Superior To A Phone Call Because You Don't Have To Catch The Person In And You Can Get Straight To The Point. No Time Is Wasted On Casual Conversation. It Also Leaves A Written Record To Refer Back To For A Response Or If You Forget Who Said What. Email Is Superior To The Traditional Office Memo Because It Uses No Paper (Save The Trees!!) And It Can Be Sent To A Whole List Of People Instantly. Purpose: Transmitting Messages Between Computer Users Major Advantage: Speed For Communication And The Lower Cost . Major Disadvantage: You Don't Know If The Receiver Actually Reads It, Though You Can Find Out If They Received It. Of Course In A Phone Conversation You Don't Really Know If The Person Is Actually Listening Either! With No Body Language Or Vocal Intonations It Is Difficult To Convey The Emotional Tone You Want. Introduction to Email Security Today email is so widely used that it has become the default means of communication where the correspondents feel that they can discuss matters that can be kept between them. ...read more.

Middle

SSL is a transport-layer protocol developed to secure TCP/IP-based protocols such as Internet Message Access Protocol (IMAP), Post Office Protocol (POP), and, of course, HTTP. By applying SSL technology to email, secure email becomes as easy to secure as web browsing. Email Security Guidelines 1) Receiving Email With Attachments a) Unsafe File Types. Never Open Any Email Attachment With Any Of The Following File Extensions: File .Bat File.Com File.Exe File.Vbs b) Unknown File Types. Never Open Any Email Attachment Or Internal Email Link With A File-Type Extension You Do Not Recognize. c) Microsoft Document Types. Never Open Any Email Attachment Or Internal Email Link With A Recognized Microsoft Document Type (E.G., .Doc, .Xls, .Ppt) Even From Someone You Know And Trust Without First Running An Updated Virus Scan Program On It. d) Ask For Plain Text. If You Receive A .Doc, .Wpd, .Xls Or Or Other Unsafe File Type As An Attachment, Even From Someone You Know, Ask Them If They Will Convert It To .Rtf, .Txt Or .Cvs And Then Resend It To You. Then Delete The Original Email And Attachment. ...read more.

Conclusion

Don't run programs of unknown origin b) Turn off your computer or disconnect from the network when not in use Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network c) Disable Java, JavaScript, and ActiveX if possible. Make regular backups of critical data: Keep a copy of important files on removable media such as ZIP disks or recordable CD-ROM disks (CD-R or CD-RW disks). Use software backup tools if available, and store the backup disks somewhere away from the computer. d) Make a boot disk in case your computer is damaged or compromised To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred. Remember, however, you must create this disk before you have a security event. Finally for email security I will remember all to follow the Email Security Guidelines because you don't know what kind of information will be in you computer and the important of it and don't know who want the get information for your computer and who will used it. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report explains a number of benefits and drawbacks regrading e-mail accounts. In addition, the report contains a good list of measures to undertake. However the background information on 'Secure Your Communication E-mail' is lacking detail and doesn't ...

Read full review

Response to the question

In summary, the report explains a number of benefits and drawbacks regrading e-mail accounts. In addition, the report contains a good list of measures to undertake. However the background information on 'Secure Your Communication E-mail' is lacking detail and doesn't explain what each point means.The report states one major benefit and one major drawback, this is quite good. As this allows the examiner to understand the key advantage and the key disadvantage. The student briefly talks about securing the e-mail account by using a 'Gateway', however the student doesn't describe what is meant by this. The examiner would still be wondering how this applies to securing an e-mail account. The list of 'Email Security Guidelines' are quite good. As these bullet points haven't listed a brief understanding. The student has justified the reason to why the measure should be undertake to prevent against any attack via e-mail. This section will gain the student high marks.

Level of analysis

The report states how using e-mails could place the user at an disadvantage if there receive a virus via e-mail. Further more the report states how 'The Melissa' virus was spread. Using this example/case study is good, as this shows relevant understanding of a real situation. However for high marks, the report could show a screenshot of what an e-mail will look like, with this virus within the message. This would allow the examiner to visualize the report.

Quality of writing

The report states the term 'E-Mail' and explains this means 'Electronic Mail', however the report hasn't given a description of what an e-mail account is and how this is used as a means of communication between a number of people. This would make a good introduction for the report, however this isn't contained within the report. The sub-sections title's could be in Bold, as the report states 'Introduction To Email Security', I didn't notice that this was a new section at first. Thus, it's important to clearly separate the report using clear sub-titles.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 22/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Marked by a teacher

    ICT Evaluation of my materials produced for a "Get Moving" health campaign.

    4 star(s)

    been sent, I can create a page on the website where people who are doing exceptional well in terms of fitness data will be shown to everyone accessing the website. This will also make the website more suited for its purpose as people visiting the website will see people who

  2. Uses of ICT.

    Disadvantages are things like the phone line can't always get a connection to the internet. Sometimes phones cannot be accessed if the number is busy or has a fault. Fax machines; - are connected to a normal phone line, a fax machine allows you to transmit pieces of paper to someone else instantly.

  1. The Impact of ICT on society.

    The goverment has increased the number of speed cameras dramatically saying that they have huge impact of the speed the drivers travel down roads. They argue that if Speed cameras have resulted in the lack of deaths of children especially on busy roads.

  2. Internal and external methods of communications for Marks and Spencer's.

    because when a new season also when Christmas comes Marks and Spencer's will get very busy and there will long queue so why wait when you got an online service. Most people who have Internet at home are starting to use this sort of service as it is quicker and saves time.

  1. Impact of ICT on Society

    This was merely thought of ten years before that mobile phones would have this in the future. Before mobiles use to be dull and black but over the years new type of mobiles have been developed with different shapes and coloured designed.

  2. I will describe a short formal document using order form as one of my ...

    Audience type The audience type for newspaper (extended formal document) is for the public in general. There is no specific age limited in a news paper, because there are all kinds of newspapers, As long as the reader is capable of reading the newspaper.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    to the customers. (Permission marketing6 rather than the spamming of e-mails) 2. Targeting Identifying and responding to specific customer behaviours and preferences SK-II is targeted at the upper-end cosmetics market. An approach called market basket database allows the association of one item with others, eg.

  2. The main Internet technologies.

    * A text message is far cheaper than a phone call yet in most instances you will convey just as much information as you would have if you had called. * Unlike a phone call, an SMS message is automatically stored where it can be re-read.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work