1 / 18

Objectives

Objectives . Discuss reasons of email delivery failure Discuss the reasons of garbled messages Explain widows formatting options Define terms such as paper trail and hasty responses Differentiate between different kinds of viruses Mention different causes of viruses . Vocabulary

milt
Download Presentation

Objectives

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Objectives • Discuss reasons of email delivery failure • Discuss the reasons of garbled messages • Explain widows formatting options • Define terms such as paper trail and hasty responses • Differentiate between different kinds of viruses • Mention different causes of viruses

  2. Vocabulary • Netiquette • Spam • Fraud • Phishing • Pyramid scheme • Hoax • Urban legend • Worm • Time bomb • Logic bomb • Trojan horse

  3. Delivery failure takes place because of : Email address was mistyped The email may have a virus or a worm attached The receiver has a spam filtering program The sender is blocked The recipient's mail box is full

  4. Garbledmessages Use your books to Take a look at figure 3-13 page 55 Can you understand anything? When does it take place ? What email messages format are garbled frequently? How to fix the problem ? When internet traffic is heavy Rich text format (RTF) are garbled frequently The person sending this message should change the format to HTML

  5. Lost formatting Windows mail provides two formatting options Plain text HTML Multiple fonts , bold text headings , links to websites and graphics Do all e-mail programs support HTML formatted messages ? What if not all support what will happen to the message ?

  6. Lack of paper trail What is a paper trail? Mention types of electronic communication that provide paper trail? A paper trail is a written record ,history or collection of evidence created by a person or organization in the course of activities. E- mail supports paper trail but instant messaging and teleconferencing don not provide paper trail

  7. Hasty responses To avoid sending a message that you later would regret consider the following : Discuss your response with someone else Write your message but do not include your email address Save your message as a draft so that you can read it later to reevaluate the response Imagine one day you received an e-mail message from someone that made you very angry , what would you do?

  8. Volume of email replies What is meant by communications netiquette ? Refers to good manners and proper behaviors when communicating through electronic media Some netiquette guidelines when replying to a message : When you want to send a reply to message click on the reply button to show that this is a reply for the email you received , your reply is important but do not send responses that are not replicable You have to know when to use reply and when to use reply to all Another two options are cc and bcc

  9. Junk mail “Spam” What do junk mail include ? They may include : Advertisements Pornography Illegitimate offers How can we help prevent spam / junk mail ?

  10. Use caution in giving out your email address ,do not publish it online, on a website or newsgroup Check the website’s privacy statement before you provide your email address Never reply to a junk e-mail Windows mail includes a junk email filter that is turned on by default

  11. E-mail fraud Computer fraud is conduct involving the use of a computer to obtain money or property dishonestly or to cause loss, such as Stealing money from bank accounts Stealing information from other people’s computers for gain

  12. E-mail fraud Phishing : personal information scams , this type of message appears to come from a legitimate source , such as your bank Sometimes the message asks you to update your Personal information which will be used from the thief Pyramid schemes : illegal business models where profits are based on investor’s ability to recruit other individuals who are enrolled to make payments to their recruiters Generally neither a product or service is delivered

  13. Hoaxes : is an attempt to deceive an audience into believing that something false is real Some email hoaxes appear to be warnings about potential viruses but actually contain viruses themselves One of the famous media hoaxes occurred in 1938 when Orson Welles shocked the nation with his radio broadcast titled “the war of the worlds” many listeners believed that invaders from Mars were attacking the world

  14. Looking into the following will help in detecting possible harmful files : The email is a warning message about a virus The message may be very wordy , be in capital letters or include dozens of exclamation marks The message asks you to share this information with others The message appears credible because it describes the message in a credible way The message comes with an attachment and you do not know who it is from Use antivirus software and keep it updates

  15. Hoaxes , urban legends , myths and chain letters grow through the internet Urban legends Are stories that could be at one time partially true but have grown into a mythical yarn when retelling Some of this false information maybe harmful Other chain letters have viruses attached in them

  16. Computer virus can make major damage to your computer or it can make minor changes such as displaying sounds or messages on the screen Lets see this together

  17. A worm : makes many copies of itself resulting in the consumption of system recourses that slows down or stops tasks A time bomb : a virus that does not cause its damage until a certain date or until the system has been booted a certain number of times

  18. Logic bomb: a virus that is triggered by the appearance or disappearance of specified data Trojan horse: is a virus that does something different from what it is expected to do .

More Related