Anti-Spam Tutorial Series Overview

We thought you might need help in defining some of the words mentioned all throughout the series. This video is going to straighten things out by providing simple explanations of commonly used terms about email security, protection, and filtering. The purpose of the series is also included.

WORDS DISCUSSED:

📧 Phishing 0:48

Phishing is a type of online scam where criminals impersonate legitimate organizations via email, text message, advertisement, or other means in order to steal sensitive information. This is usually done by including a link that will appear to take you to the company’s website to fill in your information – but the website is a clever fake and the information you provide goes straight to the crooks behind the scam.

📧 Ransomware 1:12

Ransomware is a type of malicious software that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker.

📧 Spear-phishing 1:25

Spear phishing is a phishing method that targets specific individuals or groups within an organization. It is a potent variant of phishing, a malicious tactic that uses emails, social media, instant messaging, and other platforms to get users to divulge personal information or perform actions that cause network compromise, data loss, or financial loss.

📧 Malware 1:48

Malware, short for “malicious software,” refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.

📧 Advanced Persistent Threats (APTs) 2:09

An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time. APT attacks are initiated to steal data rather than cause damage to the target organization's network. The goal of most APT attacks is to achieve and maintain ongoing access to the targeted network rather than to get in and out as quickly as possible.

📧 Bayesian Filter 2:36

A Bayesian filter is an email spam filter. It looks for certain characteristics in emails and uses them to calculate the probability of that email being spam. For every spam characteristic found, a Bayesian filter will increase the probability that the email is spam. If the filter eventually estimates that the email has a 99% or higher probability of being spam, into the spam folder it goes.

📧 IP Address 3:03

An IP address is a number identifying a computer or another device on the Internet. It is similar to a mailing address, which identifies where postal mail comes from and where it should be delivered. IP addresses uniquely identify the source and destination of data transmitted with the Internet Protocol.

📧 2FA 3:23

Two-factor authentication (2FA) is an extra step added to the log-in process, such as a code sent to your phone or a fingerprint scan, that helps verify your identity and prevent cybercriminals from accessing your private information. 2FA offers an extra level of security that cyber thieves can’t easily access because the criminal needs more than just your username and password credentials.

📧 Domain Name 3:46

A domain name refers to your website address. This is what users type in a browser's search bar to directly access your website. A domain name is unique and cannot be shared between different sites. For example, foresite-it.com.au

📧 Subdomain 4:09

A subdomain is an additional part of your main domain name. Subdomains are created to organize and navigate to different sections of your website. You can create multiple subdomains or child domains on your main domain.

📧 False-positive 4:40

A false positive email message is a legitimate message that a spam blocker incorrectly identifies as spam.

📧 False-negative 4:49

A false negative, or missed spam, an email message is a spam message that a spam blocker does not correctly identify as spam.

📧 TLS (Transport Layer Security) 4:57

TLS is a data encryption technology that provides secure data transfers. It encrypts (or scrambles) all data sent from one system to another. Any third party that attempts to "eavesdrop" on the transfer will be unable to recognize the data.

Previous

Anti-Spam Tutorial Series Episode 1: ACCOUNT ACTIVATION

Next

Quick Tips on How to Identify a Spam Email