Problem of spam mail, Computer Network Security

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evaluate several approaches to combating spam that are in common use at present. What ideas are emerging from current research, and which of these do you think have a reasonable chance of success?

Spam mails are also known as junk mails or unsolicited bulk mails. Spam is the use of electronic messaging systems which includes most broadcast media, digital delivery systems etc. to send unsolicited bulk messages in bulk to numerous recipients. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, social networking spam, television advertising and file sharing network spam. A fake profile in an online community , an unsolicited comment in log, a commercial unwelcomed thread in an online discussion boards etc are example of a new form of spamming techniques.

Spam is a major threat to the Internet security in the present scenario. According to the McAfee threat report , there were 153 billion spam messages per day in the year 2008 and over 90% of the emails were just spam. Web spambots are a new type of internet robot that spread spam content through applications like wikis, online discussion boards, blogs, social networking platforms etc. These robots are designed to act like humans in order to fool naive users and safeguards.

Network of virus infected computers, generally known as botnets are used to send spam. Spam mails not only levy a heavy cost on the network but are also a threat to the security of the recipient as certain spam mails lure the recipient to enter their confidential data like bank account details and passwords. Then the scrupulous spammers, rob the naïve recipients of their money.

Spam mails are a serious problem. Not only researchers and network administrators, but even the governments are working to combat this problem. Different countries have their jurisdictions and laws made and enforced to combat this problem.

Posted Date: 2/28/2013 6:59:06 AM | Location : United States







Related Discussions:- Problem of spam mail, Assignment Help, Ask Question on Problem of spam mail, Get Answer, Expert's Help, Problem of spam mail Discussions

Write discussion on Problem of spam mail
Your posts are moderated
Related Questions
(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Encode the following plaintext, using the Caesar cipher:             LORD OF THE RINGS b) The following ciphertext              jw njbh lxmn cx kanjt has been encoded usi

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Firewalls A firewall in an information security program that prevents specific types of information from moving between the outside world and the inside world. The firewall may

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip