Page 175 - StudyBook.pdf
P. 175
Communication Security: Remote Access and Messaging • Chapter 3 159
gram, by opening an attached document, or by decompressing a file.Viewing
HTML documents in the Preview pane has the same effect as opening the HTML
message itself.Antivirus software should provide real-time scans of user’s systems,
and should check e-mail attachments on a regular basis.
Spam is UBE, much like the advertisements and other junk mail that that fre-
quently fills home mailboxes. Spam filters are programs that analyze the contents of
messages to see if they have the common elements of spam. Spam is considered to
be a DoS attack, because it has the ability to disable e-mail servers by overloading
the e-mail storage with junk messages.
Regarding hoaxes, if something seems too good to be true, it probably is. If
users are not sure of the validity of an e-mail message, they should check their anti-
virus provider’s Web site to see if it is a hoax or a real threat. Users should never
follow any instructions within an e-mail that tells users to delete certain files or
send information to an unknown party.
Exam Objectives Fast Track
The Need for Communication Security
Potentially sensitive data is being transmitted over public networks.
Users want the ability to work from home.
Hackers have tools readily available on the Internet.
Hacking is such a popular pastime that underground networks for passing
information and techniques now exist.
RAS
802.1x uses EAP for passing messages between the supplicant and the
authenticator.
RADIUS and TACACS use UDP, and TACACS+ uses TCP
PPTP uses TCP and port 1723, and L2TP uses UDP and port 1701
IPSec uses two protocols:AH and ESP
www.syngress.com