Press "Enter" to skip to content

Ramesh gaddam security techniques and mechanism protecting against spam activity

Last updated on 22.05.2020

Spamming is all about using electronic messaging systems like emails to send or broadcast unwanted messages to large groups of people. Its all about marketing or promoting a product. The spam generally executed by the spammer by collecting random emails from various websites. When the user accesses any website or chatrooms which they use to communicate commonly. Spammers can get the victim鈥檚 email id鈥檚 through a virus, they can also sell the victim鈥檚 email ids to another spammer. Using spam the organization can overwhelm a large group of people with the ads by promoting their product advantage. For example they can have won the prize and claim the prize by reverting the mail with their personal details that can include the victim鈥檚 banking details.

There are few spamming techniques and how to protect from the spam activity follows as:

Email Spamming: Junk mails that contain irrelevant contents such as marketing ads that are sent to a huge group of people or victims who actually haven’t requested for it. Using this technique is the most commonly used technique by the spammers because the cost of it is very low when compared to other techniques. Email spamming can cause viruses and phishing.

  • 路 Blacklisting the email spam: We can block the spam emails in Gmail using the domain name. when you visit Google, you have to enter google.com I this URL google is the domain name. for example, when we receive multiple spam emails from craigelist.com we can now use the domain name and protect against spam activity.
  • 路 Network or Service Spamming: In this technique network service is used such as Facebook, youtube, cloud-based services, etc, there is a technique to get more likes and use cookies they can get the personal information of the users.
  • 路 Protect from Network Spamming: Heavy traffic that would crash your service can be prevented by using an anti-spam technique like clean talk. The clean talk will stop the spam message from entering into ur service beforehand by thorough check on registration messages etc.
  • 路 Virus: Spammers can use attractive logos or statements that contain a link or document which will ask you to click on it to download. for example: 鈥淢ake money fast. When the installation happens it will extract the victim鈥檚 data and erase it from the database to bring the system on halt mode.
  • 路 Anti-Virus: we have numerous free anti-virus software to protect your system where you a witch on or off whenever you need it. It is very useful for a group of people who are very careless about the speed of the system that could be affected by accessing different websites that could be a reason fro virus attacks. Anti-Virus software will do the performance checks and virus scans on interval mode to protect the system from the dangerous virus attacks.
  • 路 Educating the people or employees about the spam activity and how to block the irrelevant messages from the external sources that are not identified plays a very important in security mechanism against spam activity.
Other essay:   About conseils pour contacter le service client de b and you

Reference:

  • Alsaleh, M., & Alarifi, A. (2016). Analysis of Web Spam for Non-English Content: Toward More Effective Language-Based Classifiers. Plos One, 11(11), e0164383. https://doi.org/10.1371/journal.pone.0164383
  • Akkaladevi, S., & Katangur, A. K. (2010). Defending against Botnets. Journal of Applied Global Research, 3(7), 50鈥61. Retrieved from http://0-search.ebscohost.com.library.acaweb.org/login.aspx?direct=true&AuthType=ip”,cpid”,url&custid=s4338230&db=a9h&AN=63283561
  • Delaney, B. L., Klein, S. R., Marion, C. S., Nguyen, D. T., & Pachman, T. S. (2005). California Privacy and Security Legislation Affects Entire Nation. Intellectual Property & Technology Law Journal, 17(3), 21鈥24. Retrieved from http://0-search.ebscohost.com.library.acaweb.org/login.aspx?direct=true&AuthType=ip”,cpid”,url&custid=s4338230&db=buh&AN=17200629
  • Brunton, F. (2013). Spam : A Shadow History of the Internet. Cambridge, Massachusetts: The MIT Press. Retrieved from http://0-search.ebscohost.com.library.acaweb.org/login.aspx?direct=true&AuthType=ip”,cpid”,url&custid=s4338230&db=nlebk&AN=562440

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

0 Shares
Share via
Copy link

Spelling error report

The following text will be sent to our editors: