en.unionpedia.org

Email spoofing, the Glossary

Index Email spoofing

Email spoofing is the creation of email messages with a forged sender address.[1]

Table of Contents

  1. 38 relations: Backscatter (email), Bounce message, Business continuity planning, Communication protocol, Computer security, Cybercrime, DigitalOcean, Disposable email address, DMARC, DomainKeys Identified Mail, Email, Email authentication, Email fraud, Email spam, Email spoofing, Email-address harvesting, Envelope, Federal Bureau of Investigation, Fingerprint Cards, IP address, Joe job, Klez, Malware, MARID, Message forgery, New Zealand Fire Service, Phishing, Ransomware, Samsung, Save the Children USA, Sender Policy Framework, Simple Mail Transfer Protocol, Sober (computer worm), Social engineering (security), Te Wānanga o Aotearoa, Threat (computer security), Transport Layer Security, Ubiquiti.

  2. Types of cyberattacks

Backscatter (email)

Backscatter (also known as outscatter, misdirected bounces, blowback or collateral spam) is incorrectly automated bounce messages sent by mail servers, typically as a side effect of incoming spam. Email spoofing and Backscatter (email) are spamming.

See Email spoofing and Backscatter (email)

Bounce message

A bounce message or just "bounce" is an automated message from an email system, informing the sender of a previous message that the message has not been delivered (or some other delivery problem occurred). Email spoofing and bounce message are email.

See Email spoofing and Bounce message

Business continuity planning

Business continuity may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident", and business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.

See Email spoofing and Business continuity planning

Communication protocol

A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity.

See Email spoofing and Communication protocol

Computer security

Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer systems and networks from threats that may result in unauthorized information disclosure, theft of (or damage to) hardware, software, or data, as well as from the disruption or misdirection of the services they provide. Email spoofing and computer security are Cybercrime.

See Email spoofing and Computer security

Cybercrime

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. Email spoofing and Cybercrime are Organized crime activity.

See Email spoofing and Cybercrime

DigitalOcean

DigitalOcean Holdings, Inc. is an American multinational technology company and cloud service provider.

See Email spoofing and DigitalOcean

Disposable email address

Disposable email addressing, also known as DEA, dark mail or masked email, refers to an approach that involves using a unique email address for each contact or entity, or using it for a limited number of times or uses. Email spoofing and Disposable email address are email and spamming.

See Email spoofing and Disposable email address

DMARC

Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication protocol.

See Email spoofing and DMARC

DomainKeys Identified Mail

DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam.

See Email spoofing and DomainKeys Identified Mail

Email

Electronic mail (email or e-mail) is a method of transmitting and receiving messages using electronic devices. Email spoofing and Email are Internet terminology.

See Email spoofing and Email

Email authentication

Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message. Email spoofing and email authentication are email and spamming.

See Email spoofing and Email authentication

Email fraud

Email fraud (or email scam) is intentional deception for either personal gain or to damage another individual using email as the vehicle. Email spoofing and email fraud are Confidence tricks, spamming and types of cyberattacks.

See Email spoofing and Email fraud

Email spam

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). Email spoofing and email spam are email and spamming.

See Email spoofing and Email spam

Email spoofing

Email spoofing is the creation of email messages with a forged sender address. Email spoofing and email spoofing are Confidence tricks, Cybercrime, deception, email, fraud, Internet terminology, Organized crime activity, Practical jokes, social engineering (security), spamming and types of cyberattacks.

See Email spoofing and Email spoofing

Email-address harvesting

Email harvesting or scraping is the process of obtaining lists of email addresses using various methods. Email spoofing and email-address harvesting are spamming.

See Email spoofing and Email-address harvesting

Envelope

An envelope is a common packaging item, usually made of thin, flat material.

See Email spoofing and Envelope

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.

See Email spoofing and Federal Bureau of Investigation

Fingerprint Cards

Fingerprint Cards is a Swedish biometrics company that develops and produces biometric systems.

See Email spoofing and Fingerprint Cards

IP address

An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication.

See Email spoofing and IP address

Joe job

A Joe job is a spamming technique that sends out unsolicited e-mails using spoofed sender data. Email spoofing and joe job are email and spamming.

See Email spoofing and Joe job

Klez

Klez is a computer worm that propagates via e-mail.

See Email spoofing and Klez

Malware

Malware (a portmanteau of malicious software)Tahir, R. (2018). Email spoofing and Malware are Cybercrime.

See Email spoofing and Malware

MARID

MARID was an IETF working group in the applications area tasked to propose standards for email authentication in 2004.

See Email spoofing and MARID

Message forgery

In cryptography, message forgery is sending a message so to deceive the recipient about the actual sender's identity. Email spoofing and message forgery are Practical jokes.

See Email spoofing and Message forgery

New Zealand Fire Service

The New Zealand Fire Service (Whakaratonga Iwi, "Service to the People"; also known as the NZFS) was New Zealand's main firefighting body from 1 April 1976 until 1 July 2017 – at which point it was dissolved and incorporated into the new Fire and Emergency New Zealand.

See Email spoofing and New Zealand Fire Service

Phishing

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Email spoofing and Phishing are Confidence tricks, Cybercrime, deception, fraud, Internet terminology, Organized crime activity, social engineering (security), spamming and types of cyberattacks.

See Email spoofing and Phishing

Ransomware

Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a "ransom" is paid.

See Email spoofing and Ransomware

Samsung

Samsung Group (stylised as SΛMSUNG) is a South Korean multinational manufacturing conglomerate headquartered in Samsung Digital City, Suwon, South Korea.

See Email spoofing and Samsung

Save the Children USA

Save the Children Federation, Inc., more commonly known as Save the Children USA, is a non-profit organization in the United States.

See Email spoofing and Save the Children USA

Sender Policy Framework

Sender Policy Framework (SPF) is an email authentication method which ensures the sending mail server is authorized to originate mail from the email sender's domain.

See Email spoofing and Sender Policy Framework

Simple Mail Transfer Protocol

The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission.

See Email spoofing and Simple Mail Transfer Protocol

Sober (computer worm)

The Sober worm is a family of computer worms that was discovered on October 24, 2003.

See Email spoofing and Sober (computer worm)

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Email spoofing and social engineering (security) are Confidence tricks, Cybercrime and deception.

See Email spoofing and Social engineering (security)

Te Wānanga o Aotearoa

Te Wānanga o Aotearoa is an indigenous tertiary education provider with over 80 campuses throughout New Zealand.

See Email spoofing and Te Wānanga o Aotearoa

Threat (computer security)

In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.

See Email spoofing and Threat (computer security)

Transport Layer Security

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.

See Email spoofing and Transport Layer Security

Ubiquiti

Ubiquiti Inc. (formerly Ubiquiti Networks, Inc.) is an American technology company founded in San Jose, California, in 2003.

See Email spoofing and Ubiquiti

See also

Types of cyberattacks

References

[1] https://en.wikipedia.org/wiki/Email_spoofing

Also known as Business E-mail Compromise, Business Email Compromise, Business email compromise attacks, E-mail hoax, E-mail source address spoofing, E-mail spoofing, Email domain spoofing, Email hoax, Forged email, Hoax e-mail, Hoax email, HoaxMail, Invoice redirect fraud, Prank email, Spoof Email, Spoof mail, Spoofed email.