Overview
FrançaisABSTRACT
The Internet has recently become a global tool essential for data transfer but also the target of ill-intentioned users. SPAM is one of the most frequent attacks. The mailing adresses are collected electronically and then reused in a mass marketing strategy. This article presents the technique for fighting SPAM with their advantages and drawbacks such as the mail relay solution with antispam protection.
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHOR
-
Laurent LEVIER: Internal Network Security Officer, Equant Telecommunications - CISSP (Certified Information Systems Security Professional) - CISM (Certified Information Security Manager) - CGEIT (Certified in the Governance of Enterprise IT)
INTRODUCTION
With its democratization, the Internet has become the planetary data transport network par excellence, available to virtually everyone in most countries of the world. What's more, every company in the world is now connected to it.
Unfortunately, as with too many benefits, some evil-doers found a bad use for it. A network on which you can electronically collect the e-mail addresses of millions of people, sometimes with the owner's profile, and which is virtually free to use, was too tempting for mass marketing, or simply for sending messages of no interest or no use. SPAM was born.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
CAN BE ALSO FOUND IN:
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Messaging with antispam
Bibliography
Also in our database
Websites
https://www.broadcom.com/products/cyber-security
...Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference