Problem of spam mail, Computer Network Security

Assignment Help:

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evaluate several approaches to combating spam that are in common use at present. What ideas are emerging from current research, and which of these do you think have a reasonable chance of success?

Spam mails are also known as junk mails or unsolicited bulk mails. Spam is the use of electronic messaging systems which includes most broadcast media, digital delivery systems etc. to send unsolicited bulk messages in bulk to numerous recipients. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, social networking spam, television advertising and file sharing network spam. A fake profile in an online community , an unsolicited comment in log, a commercial unwelcomed thread in an online discussion boards etc are example of a new form of spamming techniques.

Spam is a major threat to the Internet security in the present scenario. According to the McAfee threat report , there were 153 billion spam messages per day in the year 2008 and over 90% of the emails were just spam. Web spambots are a new type of internet robot that spread spam content through applications like wikis, online discussion boards, blogs, social networking platforms etc. These robots are designed to act like humans in order to fool naive users and safeguards.

Network of virus infected computers, generally known as botnets are used to send spam. Spam mails not only levy a heavy cost on the network but are also a threat to the security of the recipient as certain spam mails lure the recipient to enter their confidential data like bank account details and passwords. Then the scrupulous spammers, rob the naïve recipients of their money.

Spam mails are a serious problem. Not only researchers and network administrators, but even the governments are working to combat this problem. Different countries have their jurisdictions and laws made and enforced to combat this problem.


Related Discussions:- Problem of spam mail

Explain web defacement, QUESTION (a) Compare and contrast phishing and ...

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Public key cryptosystem based on rsa technology, Problem: (a) What is ...

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Tomcat server, how to access tomcat by internet

how to access tomcat by internet

Develop a completely secure wsn based on the triple key, Q. Develop a compl...

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

How will network datagrams be protected at network layer, (a) Consider the...

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

Public key cryptography encryption, What do you understand by the term encr...

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

Develop a tcp-based client-server socket program, Develop a TCP-based clien...

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Explain how ethernet deals with collisions, (a) Describe how CSMA/CD operat...

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

Transmission errors in networking, TRANSMISSION ERRORS:  Transmission...

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Describe the terms prime number and prime factorisation, (a) An opponent is...

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd