Students also studied
Study guides
Practice questions for this set
After determining that a crime has been committed involving e-mail, (1) , if possible, and then (2). Next, (3). (You might also want to lớn forward the message to lớn another e-mail address, depending on your organization's guidelines.)
After you compare e-mail logs with messages, you should verify the:
For other e-mail applications that use the mbox format, a ____________ can be used to lớn carve messages manually. This technique requires perseverance because it's tedious and time consuming.
Simple Mail Transfer Protocol (SMTP)
A protocol for sending e-mail messages between servers.
To determine whether redirection has been used, you need to
view the message's HTML source code and kiểm tra whether an Internet liên kết is a label with a redirect to lớn a different Web address.
E-mail can be sent and received in two environments
Internet (public use) Intranet (an internal network)
Investigating crimes or policy violations involving e-mail goals
Your goal is to lớn find out who's behind the crime or policy violation, collect the evidence, and present your findings to lớn build a case for reprimands, prosecution, or arbitration.
Spam is a crime in every state
False; E-mail crimes depend on the đô thị, state, or country
Language and law Language in the legal process Language as evidence Research/teaching (language as evidence is the focus here)
Access victim's computer or mobile device to lớn recover the evidence Using the victim's e-mail client Find and copy any potential evidence Access protected or encrypted material Print e-mails Guide victim on the phone Open and copy e-mail including headers You may have to lớn recover deleted e-mails
The main piece of information you're looking for is the originating e-mail's IP address Date and time the message was sent Filenames of any attachments Unique message number (if supplied) Aka:
An ESMTP number or reference number
The sender and receiver e-mail addresses
The e-mail servers the message traveled through to lớn reach its destination
Most e-mail programs also include an address book of contacts, and many offer calendars, task lists, and memos.
A suspect's address book, calendar, task list, and memos can contain valuable information that links e-mail crimes or abuse to lớn other parties and reveal the suspect's physical address and even involvement in other crimes.
In Web-based e-mail, messages are displayed and saved as Web pages in the browser's cache folders.
These files are usually stored in different folders kêu ca Internet data files are.
Contact the administrator responsible for the sending server Use a registry site to lớn find point of contact:
www.arin.net www.internic.com www.google.com
Verify your findings by checking network e-mail logs against e-mail addresses
Record all incoming and outgoing traffic Have rules to lớn allow or disallow traffic You can resolve the path a transmitted e-mail has taken
Filter e-mail traffic Verify whether the e-mail passed through
An e-mail server is loaded with software that uses e-mail protocols for its services and contains relevant logs
Database Flat tệp tin system