From the course: IT Security Foundations: Core Concepts
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Securing email
From the course: IT Security Foundations: Core Concepts
Securing email
- [Presenter] Email is the most commonly used communication tool for personal and business use. In this segment, we'll learn ways email can pose a risk, along with ways to prevent an attack. Although highly effective, using email can be a threat to the security of an individual or organization. Malicious actors use multiple techniques to gain access to our systems. Common methods include using spam, which targets email recipients with multiple mail messages. Spoofing techniques are used to spoof the email and websites, and malware can be embedded within the email. And to bait the victim to open the email and click on a link, malicious actors will use a phishing attack. In a phishing attack, the victim is sent a message that appears urgent, and one in 10 individuals will respond. In the background, threat management will monitor for malware, but it may slip by undetected. Now, generally within the email, there's a link. And…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.