{"id":4911,"date":"2021-06-12T18:16:29","date_gmt":"2021-06-12T18:16:29","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs\/?post_type=chapter&#038;p=4911"},"modified":"2022-07-25T19:24:05","modified_gmt":"2022-07-25T19:24:05","slug":"security-threats-in-email","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/chapter\/security-threats-in-email\/","title":{"raw":"Security Threats in Email","rendered":"Security Threats in Email"},"content":{"raw":"<div class=\"textbox learning-objectives\">\r\n<h3>Learning Outcomes<\/h3>\r\n<ul>\r\n \t<li>Identify security threats in emails<\/li>\r\n<\/ul>\r\n<\/div>\r\nAs you use email, it is crucial that you can recognize security threats and protect yourself and your organization.\r\n\r\n<strong>Malware<\/strong> is any software specifically designed to damage a computer system without the owner's knowledge. It is short for \"malicious software.\"\r\n\r\nThere are several different types of malware, all of which can be transmitted through email:\r\n<ul>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\">A <strong>virus<\/strong> is a \"deviant\" program stored on a computer floppy disk, hard drive, or CD, that can cause unexpected and often undesirable effects such as destroying or corrupting data.<\/li>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\">A <strong>t<\/strong><strong>rojan horse<\/strong> is a program that is packaged with a useful application, usually free, such as a screensaver, but carries a destructive virus that creates problems for your computer without your knowledge. Once the program initiates, the camouflaged virus is released creating havoc and mayhem. This virus is named after the mythical Trojan horse that was left as a gift to the Trojan people from the Achaeans as a trick. A trojan horse is one of the biggest threats to computer security as they cannot be identified easily.<\/li>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\">A <strong>worm<\/strong> is a type of malware that copies itself repeatedly into a computer's memory (RAM) using up all available RAM. It also can copy on to a disk drive so it can load into RAM again. It spreads through a network to infect the RAM on other connected computers.\u00a0 A worm can infect your computer through email (the worm is disguised by pretending it came from somewhere it did not). When you open the email attachment the worm looks through your Windows Outlook and other address books choosing names at random. Using built-in software, the worm sends copies of itself to many names in the address books.<\/li>\r\n<\/ul>\r\n<ul>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Spyware<\/strong> is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. Too much spyware can slow down the operation of a computer.<\/li>\r\n<\/ul>\r\n<h2>Other Email-Related Threats:<\/h2>\r\n<ul>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Spam<\/strong> is flooding the internet with many copies of the same message. Most spam is derived from commercial advertising. It is not a security threat, but it can make it difficult to sort out important emails if you receive too much spam. You can obtain spam filters that spare the hassle of junk email, ads etc.<\/li>\r\n<\/ul>\r\n<ul>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Phishing<\/strong> is an illegal activity where someone attempts to acquire sensitive information such as user names, passwords and credit card information. Often, users are asked to enter these details onto a fraudulent website. Phishing may employ highly advanced imitation websites which steal digital information. However, they often employ simpler messages like emails requesting bank information disguised as a desperate cry for financial help or a random donation from a wealthy individual. The purpose of the fraudulent email is to \"phish\" for, or entice people to share their personal, financial, or password data. It's then used to commit crimes.<\/li>\r\n<\/ul>\r\n[caption id=\"\" align=\"aligncenter\" width=\"328\"]<img src=\"https:\/\/lh5.googleusercontent.com\/1JKHvCLqOOTUx5fbxo5JHAKBdT000KyGGlxm5S-4Ec3tcvwcWxQ1JyFupJwoaMHaWCX0JBx87VSSeVYQUqLQ-tR_yevmLwXJOye9b-Cs8xnaRflgWtrwOVnZmtDG8LRNiROsggSS\" alt=\"An example of a Phishing email, depicting a fake bank statement.\" width=\"328\" height=\"243\" \/> An example of a Phishing email, depicting a fake bank statement.[\/caption]\r\n\r\n<div class=\"textbox tryit\">\r\n<h3>PRACTICE QUESTION<\/h3>\r\nhttps:\/\/assess.lumenlearning.com\/practice\/4b1003b2-41fc-494a-ab8f-e7e570726910\r\n\r\n<\/div>\r\n&nbsp;","rendered":"<div class=\"textbox learning-objectives\">\n<h3>Learning Outcomes<\/h3>\n<ul>\n<li>Identify security threats in emails<\/li>\n<\/ul>\n<\/div>\n<p>As you use email, it is crucial that you can recognize security threats and protect yourself and your organization.<\/p>\n<p><strong>Malware<\/strong> is any software specifically designed to damage a computer system without the owner&#8217;s knowledge. It is short for &#8220;malicious software.&#8221;<\/p>\n<p>There are several different types of malware, all of which can be transmitted through email:<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\">A <strong>virus<\/strong> is a &#8220;deviant&#8221; program stored on a computer floppy disk, hard drive, or CD, that can cause unexpected and often undesirable effects such as destroying or corrupting data.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">A <strong>t<\/strong><strong>rojan horse<\/strong> is a program that is packaged with a useful application, usually free, such as a screensaver, but carries a destructive virus that creates problems for your computer without your knowledge. Once the program initiates, the camouflaged virus is released creating havoc and mayhem. This virus is named after the mythical Trojan horse that was left as a gift to the Trojan people from the Achaeans as a trick. A trojan horse is one of the biggest threats to computer security as they cannot be identified easily.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">A <strong>worm<\/strong> is a type of malware that copies itself repeatedly into a computer&#8217;s memory (RAM) using up all available RAM. It also can copy on to a disk drive so it can load into RAM again. It spreads through a network to infect the RAM on other connected computers.\u00a0 A worm can infect your computer through email (the worm is disguised by pretending it came from somewhere it did not). When you open the email attachment the worm looks through your Windows Outlook and other address books choosing names at random. Using built-in software, the worm sends copies of itself to many names in the address books.<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Spyware<\/strong> is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. Too much spyware can slow down the operation of a computer.<\/li>\n<\/ul>\n<h2>Other Email-Related Threats:<\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Spam<\/strong> is flooding the internet with many copies of the same message. Most spam is derived from commercial advertising. It is not a security threat, but it can make it difficult to sort out important emails if you receive too much spam. You can obtain spam filters that spare the hassle of junk email, ads etc.<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Phishing<\/strong> is an illegal activity where someone attempts to acquire sensitive information such as user names, passwords and credit card information. Often, users are asked to enter these details onto a fraudulent website. Phishing may employ highly advanced imitation websites which steal digital information. However, they often employ simpler messages like emails requesting bank information disguised as a desperate cry for financial help or a random donation from a wealthy individual. The purpose of the fraudulent email is to &#8220;phish&#8221; for, or entice people to share their personal, financial, or password data. It&#8217;s then used to commit crimes.<\/li>\n<\/ul>\n<div style=\"width: 338px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/1JKHvCLqOOTUx5fbxo5JHAKBdT000KyGGlxm5S-4Ec3tcvwcWxQ1JyFupJwoaMHaWCX0JBx87VSSeVYQUqLQ-tR_yevmLwXJOye9b-Cs8xnaRflgWtrwOVnZmtDG8LRNiROsggSS\" alt=\"An example of a Phishing email, depicting a fake bank statement.\" width=\"328\" height=\"243\" \/><\/p>\n<p class=\"wp-caption-text\">An example of a Phishing email, depicting a fake bank statement.<\/p>\n<\/div>\n<div class=\"textbox tryit\">\n<h3>PRACTICE QUESTION<\/h3>\n<p>\t<iframe id=\"assessment_practice_4b1003b2-41fc-494a-ab8f-e7e570726910\" class=\"resizable\" src=\"https:\/\/assess.lumenlearning.com\/practice\/4b1003b2-41fc-494a-ab8f-e7e570726910?iframe_resize_id=assessment_practice_id_4b1003b2-41fc-494a-ab8f-e7e570726910\" frameborder=\"0\" style=\"border:none;width:100%;height:100%;min-height:300px;\"><br \/>\n\t<\/iframe><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-4911\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li>Security Threats in Email. <strong>Authored by<\/strong>: Lumen Learning. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Introduction to Computers\/Security. <strong>Provided by<\/strong>: Wikiversity. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/en.wikiversity.org\/wiki\/Introduction_to_Computers\/Security\">https:\/\/en.wikiversity.org\/wiki\/Introduction_to_Computers\/Security<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":364389,"menu_order":8,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Introduction to Computers\/Security\",\"author\":\"\",\"organization\":\"Wikiversity\",\"url\":\"https:\/\/en.wikiversity.org\/wiki\/Introduction_to_Computers\/Security\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"original\",\"description\":\"Security Threats in Email\",\"author\":\"Lumen Learning\",\"organization\":\"\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"4c924872-652b-4b08-8d91-406d554d25e1, 5197401b-bf3b-4583-9f87-0ff1a760c46d","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-4911","chapter","type-chapter","status-publish","hentry"],"part":4893,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/pressbooks\/v2\/chapters\/4911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/wp\/v2\/users\/364389"}],"version-history":[{"count":11,"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/pressbooks\/v2\/chapters\/4911\/revisions"}],"predecessor-version":[{"id":5666,"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/pressbooks\/v2\/chapters\/4911\/revisions\/5666"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/pressbooks\/v2\/parts\/4893"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/pressbooks\/v2\/chapters\/4911\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/wp\/v2\/media?parent=4911"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/pressbooks\/v2\/chapter-type?post=4911"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/wp\/v2\/contributor?post=4911"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-computerapplicationsmgrs-2\/wp-json\/wp\/v2\/license?post=4911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}