HomeIncidentsServicesCredit Card taking care of (PCI-DSS) requirements ComplianceResourcesAwareness & EducationFaculty & StaffEveryoneSystem Administrators and also IT ManagersUniversity it PolicyHIPAA

Best techniques for E-Mail Attachments


A popular use of e-mail is to distribute computer files (i.e., message files, documents, spreadsheets, PDF"s). This is completed by "attaching" a record to one e-mail message and also then sending out the file with the message, to a recipient. Virtually any kind of data paper can it is in attached to an e-mail post for transport.

You are watching: Which of the following is not true of e-mail?

Unfortunately, this use creates an possibility for distribution of malware. Enlarge e-mail programs often opened documents attached to messages automatically, as a convenience come the user. This resulted in infections without any type of user intervention. Newer e-mail program don"t typically open attachments automatically, so other methods have actually been work to tempt (convince) the recipient to open up attachments manually. This is referred to as "social engineering", an assault designed to do you take an action (in this case, to click the attachment). Attackers space constantly comes up with brand-new social design tactics come trick users into installing (opening the attachment) malicious programs!!!

Some current social design tactics making use of e-mail are:

customized an individual message text ("Dear John, ..." or "please evaluation the fastened invoice for...")make the message threatening ("your account will certainly be closed uneven you ...")make the attachment look unauthorized ("my_vacation_pictures.php")

How carry out we know if an attachments is "executable"?

File surname are very important due to the fact that that is how the computer system knows what to perform with the file. For example, records are called with a three-letter extension of ".pdf", which the computer system knows to open up using Adobe Reader. Various other extensions, such as ".exe or .dmg" tell the computer the paper is a routine that will certainly run instantly when it"s clicked. There room many file types and also program associations on every computer. If your computer doesn"t know what to do with a file (it has actually no association), the computer system will prompt girlfriend to pick the correct regime to open up it.

Computer defense from Malicious Email

To aid secure the University"s computers, the following protections room being implemented: all in-coming messages are scanned for recognized Malware (viruses, worms, trojans, etc.). If malicious code is detected the whole message is discarded in ~ the campus e-mail gateway. In addition, if a file attachment is encrypted, or if it is password protected, and also therefore cannot be examined because that malicious code, it will certainly be discarded. Any kind of message the is no a recognized problem, yet has a "dangerous" (executable) attachment, will have actually the attachment deleted before the message is delivered. Message will be inserted into the post stating the attachment has actually been removed. Friend should additionally be aware that malware can be put into document files such together .docx or .pdf files, the can immediately execute (install malware) on your computer. It is in especially careful not to open unexpected attachments. Verify the legitimacy of the record from the person that sent the record on come you.

See more: Free Trade Agreements (Ftas) Led Most Directly To Which Of The Following Outcomes?

ITS supplies the adhering to list the attachments the Outlook will instantly block due to their potential risk:http://technet.microsoft.com/en-us/library/cc179163.aspx

Encrypted/Password defended Attachments

If a record attachment is encrypted, or if that is password protected, and also therefore can not be examined for malicious code, the whole message consisted of the attachment will certainly be delivered. No warning will certainly be offered to the recipient that the paper has no ben scanned. (Examples space encrypted .zip files, and also password defended office productivity files.)

Options because that Sharing Executable Programs: 

Place the file on a common drive, such as your room "L:" journey space, and also send the person its location.Place that on a web server and also send the human being a attach to its place (this is what software sellers do).