StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail - Dissertation Example

Cite this document
Summary
The purpose of this dissertation “Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail” is to research the security issues regarding unsolicited bulk mail and their consequences to the business. Bulk mail is also known as spam…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail
Read Text Preview

Extract of sample "Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail"

Download file to see previous pages

There was once a time where information was only in hard copy form.  Information was stored on paper.  Pfleeger and Bloom (2005) describe the simplicity of keeping information secure back when information was stored only on paper, “It’s easy to protect information stored on paper: we can limit the number of copies or keep them in a safe place, maybe even under lock and key. It’s also easy to limit the flow of this information from one place to another because of the effort needed to copy and transmit it from sender to receiver; paper transmission mechanisms aren’t designed for cheap and effortless proliferation to the world at large.

” Then companies started adding technology such as computer and network-related resources.  Now, most information is stored electronically via the Internet.  Fraser and Fraser (1997) explain various network-related sources, “These resources may include host computers that users use, routers, terminal servers, PCs or other devices that have access to the Internet. A site may be an end user of Internet services or a service provider such as a midlevel network.” The creation of e-mail was to originally provide a method of electronic mail delivery where messages could be delivered quickly and without the added cost and time of traditional mail, messages, and letters.

  It is one of the most popular services that the Internet and the World Wide Web has to offer.  Electronic mail, or e-mail, has become one of the most popular uses for the Internet.  E-mail is the system for using computers to send messages over the Internet according to the Cambridge Advanced Learner's Dictionary (2006).  There are many people who do not know how to surf the web, use other Internet applications, but they do know how to send e-mail.  Hence, e-mail has become a necessity in today’s society.

  However, with the introduction of spam, e-mail is no longer the best thing for users worldwide especially when it causes many negative and devastating effects.  Spam mail is the most widely spread and devastating problems in the e-mail environment.  

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail Dissertation, n.d.)
Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail Dissertation. Retrieved from https://studentshare.org/information-technology/1703142-proposing-and-deployment-of-an-anti-spam-policy
(Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail Dissertation)
Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail Dissertation. https://studentshare.org/information-technology/1703142-proposing-and-deployment-of-an-anti-spam-policy.
“Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail Dissertation”, n.d. https://studentshare.org/information-technology/1703142-proposing-and-deployment-of-an-anti-spam-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Deployment of an Anti-Spam System for Reducing Unsolicited Bulk Mail

The Process of Internet Spamming

The internet spam is an economic way of sending unsolicited bulk messages to the masses of the society.... The various forms of internet spam include the e-mail spam, spam in blogs, social networking spam, internet forum spam, etc.... Name Subject Institution Date Internet Spam Background The process of spamming involves sending bulk messages to the receiver in an indiscriminate fashion with use of communication media that are popular among the people....
5 Pages (1250 words) Essay

Unsolicited electronic messages act 2007

It has been said that a non commercial e mail can be said to be commercial if a hyper link directs the receiver to a page which markets or promotes any product.... Firstly it was argued that the decision by the court of first instance did not distinguish between a junk mail and a mail which required information from Intel sent by Hamidi.... ) Thus it can clearly be ascertained from the fact that there have been certain exceptions which have been provided for by the Act, which clearly tend to distinguish between an Unsolicited Electronic Message or a junk e-mail presumably commercial in nature and an email which is sent because it is necessary for the completion of a transaction....
2 Pages (500 words) Essay

How Spam Works

The methods employed by spammers to exploit the e-mail differentiate.... First, it is needed to say that e-mail operates on the Simple mail Transfer Protocol.... Open relay sites refer to servers that are generally allowed to be used by unknown computers in order to to send e-mail messages.... mail can be traced back to these relays, but it is unlikely that the relay operator will be able to identify the system that passed it the message....
9 Pages (2250 words) Essay

Spamming in Emails

Explain the extent to which the unsolicited Electronic Messages Act 2007 meets the suggestions in Element One of the OECD toolkit on spam and analyse the policy reasons for any differences between the Act… In acknowledgment of the proliferation of communication technologies facilitating the socio-economic problems created by spam, the Joint ICCP-CCP Task Force on Spam was created to “assist in the further conduct and co-ordination on spam and obtain a more rapid The OECD has published a toolkit on how to legislate to deal with spam....
4 Pages (1000 words) Essay

Email Security Issues

People send unsolicited emails that are commercial, and such mails deceive buyers and consumers.... For instance, a corporation should select security software that blends in the existing system of emails and run upon installation.... Business information and data is stored in emails and archives, and it becomes extremely easy for an organization to retrieve vast… Emails form the central pillar of organizations, and it is evident that this technology will proceed to find utility as the world continues to embrace new technologies (Porter 34)....
2 Pages (500 words) Essay

Employment, labor and anti-discrimination

Pursuant to the laws enforced by the Equal Employment Opportunity Commission (EEOC), one of the laws referred to Title VII of the Civil Rights Act of 1964 which states that “this law makes it illegal to discriminate against someone on the basis of race, color, religion,… The law also makes it illegal to retaliate against a person because the person complained about discrimination, filed a charge of discrimination, or participated in an employment discrimination investigation or lawsuit” (U....
1 Pages (250 words) Essay

Reducing Typical Proposal Weaknesses

The author suggests three methods for a business owner to take to reduce the typical proposal weaknesses and describes the differences between a solicited and unsolicited proposal.... In the solicited proposal, it is the customer who has requested it while in unsolicited, the company sends the customer the proposal without them having asked.... Solicited proposals are paid much more attention to and the information is relevant to the customer unlike in unsolicited proposals where there are high chances of it not being read as well as the information not being useful to the customer....
1 Pages (250 words) Assignment

Impact of Spam on Personal Computers

Spammers have developed a variety of spamming techniques, which vary by media: e-mail spam, instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, and mobile phone-messaging spam.... The paper 'Impact of Spam on Personal Computers' focuses on The unwanted and unsolicited e-mails that internet users are forced to receive is known as Spam.... Also, such spam is difficult for the system administrators and owners to deal with effectively....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us