Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3 
Richard received an email from a person claiming to be his childhood friend, Kate. The email address is unknown to Richard, but thesubject says that it is Kates newemail address. It also has an attachment, which according to the subject, is a childhood picture of them. 
 
Respond to the following in a minimum of 175 words: 
* What steps should Richard take to verify the authenticity of Kates new email ID? 
* How should Richard make sure that the attachment is not malicious? 
 
Due Day 7
Post 2 replies to classmates or your faculty member. Be constructive and professional.
 
Reply 1(Chad Tolliver):
Once Richard has been made aware that he has received a email from a supposedly childhood friend Kate he needs to review the email to ensure the authenticity of the email before opening the attachment. The first red flag is that the email address is unknown to Richard, and how to recognize malicious emails it states that a suspicious or malicious email with attachments or links is usually received from a sender that is unknown to the individual receiving the email. So as Richard aware he doesn’t know the sender Richard will then need to check the information given for the following.
* The email address
* The subject of the email
* The attachment information
As for the subject if it was a childhood friend reaching out it should state that rather than stating Kate has a new email address, and also the attachment of a childhood photo is just a way to get Richard to click to see, due to it has no relevance to the email.
Richard can take it a step father to ensure that the attachment is not malicious by scanning the email attachments for the presence of Malware. Once the scan is complete Richard will be given the results as to the email containing Malware or that the email is free from the presence of Malware.
Reply 2 Mason Hashimoto:
Aloha class happy week three hope everything has been going well for everyone. And lets jump into this weeks discussion. Richard has quite a few steps he can take to verify if Kates new email ID is really her or not. Having been in a similar situation I have a lot of perspective on this matter and some things that I did to verify if this really was an old friend of mine or not was to do a little bit of stocking on social media whether its Instagram Facebook or TikTok to at least find the person. After that if that doesnt work out then reaching out to anyone who might know her just to double check to see if this really is her or if they received anything similar as well . in my situation I actually ended up finding out that my friends email was hacked in everyone on her email contact list receive the exact same email. As far as the attachments go I would recommend Richard not click on anything until he can verify the authenticity of the email even most great antivirus softwares can still be vulnerable to some types of malware I seen in attachments. Also it would kind of be fun to see what happens after you verify its not real and see how much she can mess with that.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"