Grin logo
de en es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › Informatik - Wirtschaftsinformatik

Information Systems Security. Security Techniques and Mechanisms in Protecting Spam Activity

Titel: Information Systems Security. Security Techniques and Mechanisms in Protecting Spam Activity

Studienarbeit , 2018 , 5 Seiten , Note: 1.0

Autor:in: Business Administrator Mutinda Jackson (Autor:in)

Informatik - Wirtschaftsinformatik
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Substantially, the occurrence of attacks on computer network, together with the consequent news has both alarmed people on computer networks’ vulnerability and the risks of employing them and their dependence on them. According to diverse researches, as technology changes, so do the security parameters, requirements, needs and even standards. It is thus evident that the society is playing a kind of game, whereby its result remains tentative and perhaps not winnable; a phenomenon that is driven by several reasons. One of these reasons is that the irresistible number of computer network vulnerabilities remain to be based on software that comes from either application or even software. Another reason is the fact that there is more computer proliferation as well as computer and computer networks dependence; the more people join cyberspace, the more the likelihood of system attacks. Moreover, it is highly challenging to discover an appropriate security solution not to mention that in this case, oversupply of security experts has adverse effects on the security issues due to their opinion diversity.
Subtly, as spam, phishing and malware remain to be a big risk nowadays, email security has hastily developed over the past few years; characterized by a sequence of novel risky threats. Thus, in order to maintain email security in check, it is quite significant to observe the following big threats to email security: snowshoe spam, hacktivism and data breaches

Leseprobe


Table of Contents

1. Information Systems Security

2. Security Threats to Email

3. Layered Model for Spam Protection

Objectives and Topics

The primary objective of this work is to analyze the evolving landscape of email security threats, such as snowshoe spam, hacktivism, and data breaches, and to propose a comprehensive defense strategy based on a layered security model. The paper aims to evaluate how organizations can systematically protect sensitive data by implementing multi-stage security mechanisms and user awareness training.

  • Analysis of modern email threats (snowshoe spam, hacktivism, data breaches)
  • Evaluation of the Layered model for spam control and monitoring
  • Identification of external vs. internal mail scanning solutions
  • Importance of perimeter protection and quarantine configuration
  • Role of endpoint security and user education in threat mitigation

Excerpt from the Book

Layered model (schemes)

Therefore, in order to protect the aforementioned spam issues, it is important to apply the Layered model (schemes), which is applied in several information strategies; every layer stating the manner through which spam activity can be stopped. Layer 0/6 (SIEM, Spam Control and Monitoring) can either be the final or initial step depending on the individual (Conklin & White, 2016). Initially, the data of emails cataloged as spam has to be generated, an aspect that allows for extraction of a statistic that may facilitate the formation of a business case for improvement of the current anti-spam protection system. Again, Layer 1 (Mail Scanning via External Services) demonstrates that many default anti-spam protection systems do not have the newest threat detection technologies and shows that firms have to turn to external solutions (Reshef & Hirsh, 2006). Thus, providers will be held responsible for validation of the incoming traffic of mail servers prior to reaching users’ network.

Layer 2 (Perimeter Protection) maintains that any company or individual’s perimeter protection system has to have spam detection services. Moreover, it is critical to confirm that these services are correctly configured on top of equipping them with a robust reporting system that enables the identification of emails that are spam-classified (Conklin & White, 2016).

Summary of Chapters

1. Information Systems Security: This chapter provides an overview of the increasing vulnerability of computer networks due to software reliance and the rapid proliferation of cyber threats.

2. Security Threats to Email: This section details specific modern risks to email integrity, focusing on the challenges posed by snowshoe spam, hacktivism, and the increasing frequency of data breaches.

3. Layered Model for Spam Protection: This chapter outlines a structured, multi-layered approach to security, discussing how different technical defenses—ranging from SIEM to user training—can be integrated to mitigate spam and phishing attacks.

Keywords

Information Systems Security, Email Security, Spam, Snowshoe Spam, Hacktivism, Data Breaches, Layered Model, SIEM, Mail Scanning, Perimeter Protection, Phishing, Cybersecurity, Threat Detection, Vulnerability, User Training

Frequently Asked Questions

What is the core focus of this document?

The document focuses on the security techniques and mechanisms required to protect information systems against spam activity and associated threats like phishing and data breaches.

What are the primary security challenges discussed?

The text identifies snowshoe spam, hacktivism, and data breaches as critical threats that have emerged alongside technological advancements.

What is the central objective of the research?

The primary objective is to explain the implementation of a Layered security model to help organizations and individuals defend their email systems effectively.

Which scientific approach is recommended for spam prevention?

The author recommends the "Layered model" approach, which breaks down security into manageable stages, including monitoring, external mail scanning, perimeter protection, and endpoint security.

What topics are covered in the main section?

The main sections cover the analysis of current threat landscapes, the operational steps of a layered defense model, and the vital role of end-user education in maintaining security.

Which keywords characterize this work?

Key terms include Information Systems Security, Snowshoe Spam, Layered Model, Phishing, Data Breaches, and Cybersecurity.

How does the document define "snowshoe spam"?

Snowshoe spam is characterized by the distribution of messages in low volumes from multiple sources, making it significantly harder for traditional anti-spam software to identify and block compared to single-source spam.

Why is user training considered a critical security layer?

User training is essential because, despite technical barriers, individuals can be targets of phishing; educating users on threat types and conducting vulnerability tests helps prevent successful exploits.

What role does a quarantine system play in this model?

The quarantine system is configured to isolate potential threats and handle false positives, ensuring that legitimate communication is not lost while suspicious traffic is contained.

Are data breaches limited to large corporations?

No, the text emphasizes that data breaches affect everyone, regardless of company size, due to the common practice of reusing login credentials across multiple platforms.

Ende der Leseprobe aus 5 Seiten  - nach oben

Details

Titel
Information Systems Security. Security Techniques and Mechanisms in Protecting Spam Activity
Hochschule
University of New Orleans
Note
1.0
Autor
Business Administrator Mutinda Jackson (Autor:in)
Erscheinungsjahr
2018
Seiten
5
Katalognummer
V430930
ISBN (eBook)
9783668776371
ISBN (Buch)
9783668776388
Sprache
Englisch
Schlagworte
Security Techniques & Mechanisms Scam Protecting scam activity
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Business Administrator Mutinda Jackson (Autor:in), 2018, Information Systems Security. Security Techniques and Mechanisms in Protecting Spam Activity, München, GRIN Verlag, https://www.grin.com/document/430930
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  5  Seiten
Grin logo
  • Grin.com
  • Versand
  • Kontakt
  • Datenschutz
  • AGB
  • Impressum