Problem of spam mail, Computer Network Security

Assignment Help:

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evaluate several approaches to combating spam that are in common use at present. What ideas are emerging from current research, and which of these do you think have a reasonable chance of success?

Spam mails are also known as junk mails or unsolicited bulk mails. Spam is the use of electronic messaging systems which includes most broadcast media, digital delivery systems etc. to send unsolicited bulk messages in bulk to numerous recipients. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, social networking spam, television advertising and file sharing network spam. A fake profile in an online community , an unsolicited comment in log, a commercial unwelcomed thread in an online discussion boards etc are example of a new form of spamming techniques.

Spam is a major threat to the Internet security in the present scenario. According to the McAfee threat report , there were 153 billion spam messages per day in the year 2008 and over 90% of the emails were just spam. Web spambots are a new type of internet robot that spread spam content through applications like wikis, online discussion boards, blogs, social networking platforms etc. These robots are designed to act like humans in order to fool naive users and safeguards.

Network of virus infected computers, generally known as botnets are used to send spam. Spam mails not only levy a heavy cost on the network but are also a threat to the security of the recipient as certain spam mails lure the recipient to enter their confidential data like bank account details and passwords. Then the scrupulous spammers, rob the naïve recipients of their money.

Spam mails are a serious problem. Not only researchers and network administrators, but even the governments are working to combat this problem. Different countries have their jurisdictions and laws made and enforced to combat this problem.


Related Discussions:- Problem of spam mail

Asset identification and valuation-information security, ASSET IDENTIFICATI...

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

Improving domain blacklisting - spam mail, Improving domain blacklisting: ...

Improving domain blacklisting: Current domain blacklisting techniques are not very effective as spammers keep replacing blacklisted domains with newly registered domains. Also

Explain characteristics of associative memory networks, (a) Describe the pr...

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

What is border gateway protocol, Border Gateway Protocol It is a proto...

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

Draw the network layout, Question : a) Below is a capture of an Etherne...

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Using Technology as Experience Framework, Write a two to three (2-3) page p...

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

Processing an incoming arp message, PROCESSING AN INCOMING ARP MESSAGE ...

PROCESSING AN INCOMING ARP MESSAGE When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's add

Develop firewall rules, Question requires you to develop firewall rules bas...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Explain briefly the role of the physical layer, a) Calculate the CRC for th...

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

Distinguish between steganograhy and cryptography, Question: (a) Disti...

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd