Mailinglist Archive


[Fwd: Do you Speak Geek: Securing the Internet's Most Pervasive App]
From:Joe Klemmer
Date: Thu, 03 Mar 2005 14:53:36 -0500

	Something to do that is actually both a diversion and targeted work 
related.

-------- Original Message --------
Subject: Do you Speak Geek: Securing the Internet's Most Pervasive App
Date: Thu, 03 Mar 2005 19:05:51 GMT
From: Information Security magazine 

To: klemmerj@webtrek.com 

Our quiz on encryption algorithms sent to subscribers last week was a
huge hit...so we thought you'd find it helpful - and fun - as well!
We won't be doing these every week, heck you're busy enough as it is
and the last thing we want is to bother you with more email. But this
is a great way to take a quick break from your day for an
enlightening security quiz.

Today's topic: Securing your organization's e-mail application.

No doubt about it, e-mail is the most widely used computer
application. Unfortunately, security isn't a byproduct of popularity.
Simply click on the links below to test your e-mail security smarts.
Answers are posted on SearchSecurity.com.

1. What is a secure method of sending e-mail that uses the RSA
encryption system?
Answer: http://searchSecurity.com/r/0,,38404,00.htm?track=NL-347&ad=506893

2. What is e-mail that has been directed to a recipient through a
third-party server that does not identify the originator of the
message?
Answer: http://searchSecurity.com/r/0,,38405,00.htm?track=NL-347&ad=506893

3. What do you call a program used to detect unsolicited and unwanted
e-mail and prevents those messages from getting to a user's inbox?
Answer: http://searchSecurity.com/r/0,,38406,00.htm?track=NL-347&ad=506893

4. What is the name for Microsoft's proposed e-mail sender
authentication protocol designed to protect against domain spoofing
and phishing exploits?
Answer: http://searchSecurity.com/r/0,,38407,00.htm?track=NL-347&ad=506893

5. What document must end-users agree to follow in order to be
provided with access to a network and its applications, including
e-mail?
Answer: http://searchSecurity.com/r/0,,38408,00.htm?track=NL-347&ad=506893

6. What type of scam involves the sending of legitimate-looking
e-mails appearing to come from some of the Web's biggest sites in an
effort to gather personal and financial information from the
recipient?
Answer: http://searchSecurity.com/r/0,,38409,00.htm?track=NL-347&ad=506893

7. What is the term for an attempt to determine the valid e-mail
addresses associated with an e-mail server so that they can be added
to a spam database?
Answer: http://searchSecurity.com/r/0,,38410,00.htm?track=NL-347&ad=506893

8. What protocol ensures privacy between communicating applications
and their users on the Internet?
Answer: http://searchSecurity.com/r/0,,38411,00.htm?track=NL-347&ad=506893

9. What term describes the forgery of an e-mail header so that the
message appears to have originated from someone or somewhere other
than the actual source?
Answer: http://searchSecurity.com/r/0,,38412,00.htm?track=NL-347&ad=506893

10. What is the name for a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document?
Answer: http://searchSecurity.com/r/0,,38413,00.htm?track=NL-347&ad=506893


How'd you do? Let us know: mailto:lprevite@techtarget.com
9-10 correct: E-mail excellence
6-8 correct: E-mail expert
3-5 correct: E-mail amateur
0-2 correct: Return to sender


LEARN MORE ABOUT E-MAIL SECURITY:
Learn the ten steps to a holistic secure messaging strategy.
http://searchSecurity.com/r/0,,38414,00.htm?track=NL-347&ad=506893

Download Chapter 3, Understanding and Preventing Spam, from Kevin
Beaver's "The Definitive Guide to E-mail Management and Security."
http://searchSecurity.com/r/0,,38415,00.htm?track=NL-347&ad=506893

Balance the pros and cons of outsourcing antivirus services before
handing over the keys to your kingdom.
http://searchSecurity.com/r/0,,38416,00.htm?track=NL-347&ad=506893

TAKE OUR OTHER QUIZZES:
Test your knowledge of authentication methods.
http://searchSecurity.com/r/0,,38417,00.htm?track=NL-347&ad=506893

Put your knowledge of the vulnerability management process on the
line.
http://searchSecurity.com/r/0,,38418,00.htm?track=NL-347&ad=506893




____________________________________________________________________

To unsubscribe from this newsletter, reply to this e-mail with REMOVE
in the Subject line.

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494