Problem of spam mail, Computer Network Security

Assignment Help:

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evaluate several approaches to combating spam that are in common use at present. What ideas are emerging from current research, and which of these do you think have a reasonable chance of success?

Spam mails are also known as junk mails or unsolicited bulk mails. Spam is the use of electronic messaging systems which includes most broadcast media, digital delivery systems etc. to send unsolicited bulk messages in bulk to numerous recipients. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, social networking spam, television advertising and file sharing network spam. A fake profile in an online community , an unsolicited comment in log, a commercial unwelcomed thread in an online discussion boards etc are example of a new form of spamming techniques.

Spam is a major threat to the Internet security in the present scenario. According to the McAfee threat report , there were 153 billion spam messages per day in the year 2008 and over 90% of the emails were just spam. Web spambots are a new type of internet robot that spread spam content through applications like wikis, online discussion boards, blogs, social networking platforms etc. These robots are designed to act like humans in order to fool naive users and safeguards.

Network of virus infected computers, generally known as botnets are used to send spam. Spam mails not only levy a heavy cost on the network but are also a threat to the security of the recipient as certain spam mails lure the recipient to enter their confidential data like bank account details and passwords. Then the scrupulous spammers, rob the naïve recipients of their money.

Spam mails are a serious problem. Not only researchers and network administrators, but even the governments are working to combat this problem. Different countries have their jurisdictions and laws made and enforced to combat this problem.


Related Discussions:- Problem of spam mail

Access control matrix, You are provided with 3000 sample keystrokes for 5 u...

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

For providing the security, There are various benefits related with providi...

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

Transport protocols, TRANSPORT PROTOCOLS: Give application-to-appl...

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

Types of idss and detection methods, Types of IDSs and Detection Methods ...

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

Html, how to link html with a data base

how to link html with a data base

Pgp encryption, Produce a short report of your experiences in installing an...

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

What do you meant by the term bastion host, Question : (a) What do you...

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

Potential risks to information systems, Information System Security 1. ...

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Describe what the term session hijacking means, An overall rise in mobility...

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

Network intrusion system, In this work a network intrusion system (package)...

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd