Verified Document

Concealing Email Senders As The Research Paper

Indeed, many ISP's put hard data caps on data usage and punish (if not throttle) people that are abusive. In the age of Netflix, figuring out what is what can be hard but drilling down to the network traffic in question can clarify that. However, this even pertains to network managers/engineers at businesses. Whether it be for the data management/hassle avoidance items mentioned above and/or because employees are engaging in unethical (if not illegal) things at work, all of the above needs to be done. General training on virus/malware avoidance has to be engaged in but users should not be expected to get it all right themselves as they will often make very poor choices. Technologies such as firewalls, internet filters and overall limits on what can and cannot be done with emails (like on an Exchange Server or via the Web) have to be implemented. Blocking of certain tactics, linkages to certain sites, and general spam filtering will weed out a good many of the problems that can exist. However, end-user education can go a long way as well...

Parts of this document are hidden

View Full Document
svg-one

People that are constantly running into virus/email problems need to be trained or let go. People that use email to engage in cyber-stalking or other illegal/illicit behavior need to severely punished if not fired. Users that intentionally use the email address of others for surreptitious means should also be dispensed with because of what can truly go wrong if/when that is allowed to occur. Coupling email controls and policies with things such as idle-timer lockouts for applications and Windows at large is also a good idea as doing the latter can prevent naughty emails.
Conclusion

In short, email sender concealment can be a sign of bad deeds but people should not jump the gun and act out of ignorance. if, however, it is clear that concealment is a means to enable illegal (or even perhaps unethical) behavior, then it might need to be shut down (especially if it's illegal). There is a time and a place where this tactic can and should be used and is not illegal but the opposite clearly exists as well.

Cite this Document:
Copy Bibliography Citation

Related Documents

Firewalls Great Network Security Devices but Not a Silver Bullet...
Words: 1472 Length: 5 Document Type: Term Paper

Firewalls: Great Network Security Devices, but Not a "Silver Bullet" Solution In construction, a firewall is a hardened divider between the hostile external environment outside and what needs to be protected inside. Similarly, firewalls are designed to protect computers from being accessed by unauthorized individuals, and for the most part, they perform this task well. Unfortunately, firewalls are also akin to the castles of old when siege weapons were built to

Firewalls Computers Have Become an
Words: 2053 Length: 8 Document Type: Term Paper

Which Products are Best Suited to a Small LAN With One Publicly Accessible Web Site: Cisco PIX Firewall Software is an excellent solution for small LANs with one publicly accessible web site. "Integrated Cisco PIX firewall hardware and software delivers full stateful firewall protection and IP Security (IPSec) VPN capabilities, allowing (...) rigorous (protection of...) internal network from outside intrusions" ("Cisco PIX," 2005). Cisco PIX firewall differs from typical CPU-intensive full-time

Firewall to Protect Companies a Firewall Is
Words: 559 Length: 2 Document Type: Essay

Firewall to Protect Companies A firewall is used to protect a person or business' network from exterior harms. Firewall may use packet filtering, user or client application authentication in order to protect the network. The actual process of protecting a network requires a firewall to filter incoming packet sizes, source IP address, protocol, and destination port. Administrators of a network are able to enact firewall protection on a router and

Firewalls and Filtering
Words: 1317 Length: 4 Document Type: Research Paper

Cyber security tendencies have evolved into systems that are used for data security, mostly for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the

Survey of Commercial Firewalls
Words: 2011 Length: 7 Document Type: Term Paper

Firewalls Once upon a time a firewall was a physical barrier that kept a literal fire from spreading from one building to another. Now the term is more often used to refer to a variety of devices - both hardware and software - meant to keep information from being stolen from a computer. This paper examines the variety of commercial firewalls that are available today. Initially firewalls were separate pieces of hardware;

Cyber Firewalls Online Activities Have
Words: 2623 Length: 8 Document Type: Term Paper

This is problematic, as these kinds of issues could lead to wide spread disruptions with no one knowing or understanding where it came from. For example, if a terrorist group was able to master this tool, they could utilize it to attack Western power grids. (Magnuson, 2013) This would create significant amounts of disruptions without having anyone being able to trace what is happening directly. When this occurs, there is

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now