Understanding a business model of a spammer, Computer Network Security

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to their unscrupulous nature, could not be advertised via some legal mainstream routine.

Next, the prerequisite for advertising for a product generally includes-

  • A source of valid e-mail addresses to send spam mails to.
  • A source of delivering email messages in huge numbers to multiple recipients. This is a must for the spammer in spite of the fact that most providers of an Internet connection will not permit the sending of such vast numbers of messages.

 

The first prerequisite of collecting email addresses is generally fulfilled by a technique known as harvesting. Spammers generally collect email addresses from chat-rooms, newsgroups, web-sites, customer lists and viruses who harvest the user's address books. A practice called 'epending' is also used in which known information is used to get the email address of the receiver. It follows that if we want to put a stop to spam, the only real solution is to block SPAM at the exchange server level, before it can reach the user's mail box. The steps taken in this regard typically include:

  • Blacklisting unsecure mail servers.
  • Blacklisting compromised computers meant for use at home.
  • Checking messages for URLs of known meds-sites and the like.
  • Scrutinizing messages for luring features which are typical of bulk-marketing tactics.
Posted Date: 2/28/2013 7:01:38 AM | Location : United States







Related Discussions:- Understanding a business model of a spammer, Assignment Help, Ask Question on Understanding a business model of a spammer, Get Answer, Expert's Help, Understanding a business model of a spammer Discussions

Write discussion on Understanding a business model of a spammer
Your posts are moderated
Related Questions
Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

In the early days when there were some dozen computers machine on the network, it was done individually but now as we have looked that there are millions of computers on the intern

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i