Email spoofing, the Glossary
Email spoofing is the creation of email messages with a forged sender address.[1]
Table of Contents
38 relations: Backscatter (email), Bounce message, Business continuity planning, Communication protocol, Computer security, Cybercrime, DigitalOcean, Disposable email address, DMARC, DomainKeys Identified Mail, Email, Email authentication, Email fraud, Email spam, Email spoofing, Email-address harvesting, Envelope, Federal Bureau of Investigation, Fingerprint Cards, IP address, Joe job, Klez, Malware, MARID, Message forgery, New Zealand Fire Service, Phishing, Ransomware, Samsung, Save the Children USA, Sender Policy Framework, Simple Mail Transfer Protocol, Sober (computer worm), Social engineering (security), Te Wānanga o Aotearoa, Threat (computer security), Transport Layer Security, Ubiquiti.
- Types of cyberattacks
Backscatter (email)
Backscatter (also known as outscatter, misdirected bounces, blowback or collateral spam) is incorrectly automated bounce messages sent by mail servers, typically as a side effect of incoming spam. Email spoofing and Backscatter (email) are spamming.
See Email spoofing and Backscatter (email)
Bounce message
A bounce message or just "bounce" is an automated message from an email system, informing the sender of a previous message that the message has not been delivered (or some other delivery problem occurred). Email spoofing and bounce message are email.
See Email spoofing and Bounce message
Business continuity planning
Business continuity may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident", and business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.
See Email spoofing and Business continuity planning
Communication protocol
A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity.
See Email spoofing and Communication protocol
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer systems and networks from threats that may result in unauthorized information disclosure, theft of (or damage to) hardware, software, or data, as well as from the disruption or misdirection of the services they provide. Email spoofing and computer security are Cybercrime.
See Email spoofing and Computer security
Cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. Email spoofing and Cybercrime are Organized crime activity.
See Email spoofing and Cybercrime
DigitalOcean
DigitalOcean Holdings, Inc. is an American multinational technology company and cloud service provider.
See Email spoofing and DigitalOcean
Disposable email address
Disposable email addressing, also known as DEA, dark mail or masked email, refers to an approach that involves using a unique email address for each contact or entity, or using it for a limited number of times or uses. Email spoofing and Disposable email address are email and spamming.
See Email spoofing and Disposable email address
DMARC
Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication protocol.
DomainKeys Identified Mail
DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam.
See Email spoofing and DomainKeys Identified Mail
Electronic mail (email or e-mail) is a method of transmitting and receiving messages using electronic devices. Email spoofing and Email are Internet terminology.
Email authentication
Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message. Email spoofing and email authentication are email and spamming.
See Email spoofing and Email authentication
Email fraud
Email fraud (or email scam) is intentional deception for either personal gain or to damage another individual using email as the vehicle. Email spoofing and email fraud are Confidence tricks, spamming and types of cyberattacks.
See Email spoofing and Email fraud
Email spam
Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). Email spoofing and email spam are email and spamming.
See Email spoofing and Email spam
Email spoofing
Email spoofing is the creation of email messages with a forged sender address. Email spoofing and email spoofing are Confidence tricks, Cybercrime, deception, email, fraud, Internet terminology, Organized crime activity, Practical jokes, social engineering (security), spamming and types of cyberattacks.
See Email spoofing and Email spoofing
Email-address harvesting
Email harvesting or scraping is the process of obtaining lists of email addresses using various methods. Email spoofing and email-address harvesting are spamming.
See Email spoofing and Email-address harvesting
Envelope
An envelope is a common packaging item, usually made of thin, flat material.
See Email spoofing and Envelope
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.
See Email spoofing and Federal Bureau of Investigation
Fingerprint Cards
Fingerprint Cards is a Swedish biometrics company that develops and produces biometric systems.
See Email spoofing and Fingerprint Cards
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication.
See Email spoofing and IP address
Joe job
A Joe job is a spamming technique that sends out unsolicited e-mails using spoofed sender data. Email spoofing and joe job are email and spamming.
See Email spoofing and Joe job
Klez
Klez is a computer worm that propagates via e-mail.
Malware
Malware (a portmanteau of malicious software)Tahir, R. (2018). Email spoofing and Malware are Cybercrime.
See Email spoofing and Malware
MARID
MARID was an IETF working group in the applications area tasked to propose standards for email authentication in 2004.
Message forgery
In cryptography, message forgery is sending a message so to deceive the recipient about the actual sender's identity. Email spoofing and message forgery are Practical jokes.
See Email spoofing and Message forgery
New Zealand Fire Service
The New Zealand Fire Service (Whakaratonga Iwi, "Service to the People"; also known as the NZFS) was New Zealand's main firefighting body from 1 April 1976 until 1 July 2017 – at which point it was dissolved and incorporated into the new Fire and Emergency New Zealand.
See Email spoofing and New Zealand Fire Service
Phishing
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Email spoofing and Phishing are Confidence tricks, Cybercrime, deception, fraud, Internet terminology, Organized crime activity, social engineering (security), spamming and types of cyberattacks.
See Email spoofing and Phishing
Ransomware
Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a "ransom" is paid.
See Email spoofing and Ransomware
Samsung
Samsung Group (stylised as SΛMSUNG) is a South Korean multinational manufacturing conglomerate headquartered in Samsung Digital City, Suwon, South Korea.
See Email spoofing and Samsung
Save the Children USA
Save the Children Federation, Inc., more commonly known as Save the Children USA, is a non-profit organization in the United States.
See Email spoofing and Save the Children USA
Sender Policy Framework
Sender Policy Framework (SPF) is an email authentication method which ensures the sending mail server is authorized to originate mail from the email sender's domain.
See Email spoofing and Sender Policy Framework
Simple Mail Transfer Protocol
The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission.
See Email spoofing and Simple Mail Transfer Protocol
Sober (computer worm)
The Sober worm is a family of computer worms that was discovered on October 24, 2003.
See Email spoofing and Sober (computer worm)
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Email spoofing and social engineering (security) are Confidence tricks, Cybercrime and deception.
See Email spoofing and Social engineering (security)
Te Wānanga o Aotearoa
Te Wānanga o Aotearoa is an indigenous tertiary education provider with over 80 campuses throughout New Zealand.
See Email spoofing and Te Wānanga o Aotearoa
Threat (computer security)
In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.
See Email spoofing and Threat (computer security)
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.
See Email spoofing and Transport Layer Security
Ubiquiti
Ubiquiti Inc. (formerly Ubiquiti Networks, Inc.) is an American technology company founded in San Jose, California, in 2003.
See Email spoofing and Ubiquiti
See also
Types of cyberattacks
- ARP spoofing
- Bitsquatting
- Carding (fraud)
- Cybersquatting
- DNS spoofing
- Data breaches
- Denial-of-service attack
- Denial-of-service attacks
- Directory harvest attack
- Email fraud
- Email spoofing
- IP address spoofing
- Joanap
- LAND
- List of phishing incidents
- Lottery scam
- MAC spoofing
- Phishing
- Referer spoofing
- Rogue DHCP
- Scam baiting
- Spoofing attack
- Web skimming
References
[1] https://en.wikipedia.org/wiki/Email_spoofing
Also known as Business E-mail Compromise, Business Email Compromise, Business email compromise attacks, E-mail hoax, E-mail source address spoofing, E-mail spoofing, Email domain spoofing, Email hoax, Forged email, Hoax e-mail, Hoax email, HoaxMail, Invoice redirect fraud, Prank email, Spoof Email, Spoof mail, Spoofed email.