Verified Document

Spam Filtering Solution Available And Term Paper

Those studies that have been considered to be useful are mentioned below. Robert D. Boerner, Joanne Bourquard, Pam Greenberg (2000) comprehensively elaborates the legal aspect of spam. He provides an in-depth review of the present laws in actions and the future of legislation against spam. He concludes his study by revealing, "Most of the laws target spammers who misrepresent, falsify or forge the point of origin or the routing information of messages. Several states also prohibit the sale or distribution of software that is primarily designed for this type of falsification (Robert D. Boerner, Joanne Bourquard, Pam Greenberg, 2000)." Also, "Most states have specified that the laws apply only to spam that is sent to or generated from locations within the state." However, it is important to note that the menace of spam is a global phenomenon and even United States, with all it powers, cannot solve the problems associated with spamming.

Many other studies also examine the legal efforts and endeavors of United States and European Union to combat spam. For instance, Peter Piazza (2004) highlights the efforts made by the European Union to wage the war on spam. Furthermore, Mark Kellner (2002) provides a very shallow and limited review of some of latest measures being used by the Internet users to stop spam. The most commonly used techniques are purchasing and consistently upgrading spam filtering software and making the email addresses invisible (Mark Kellner 2002).

Lisa Phifer and David M. Piscitello (2002) provide a thorough analysis of the present security situation relating to the use of Internet. They conclude their study by summarizing and suggesting the 10 most valuable practices successfully adopted by organizations to combat the evils associated with ecommerce, which includes spam. These 10 most valuable practices are:

1). Physical security. Think beyond the obvious measures usually taken to secure company offices; (2). Secure perimeters. Internet firewalls meet the 90-percent rule: Properly configured, they block the noisy, low-level inbound attacks; (3). Authentication. it's high time to get rid of weak username/password authentication. Use two-factor authentication, based on tokens, digital certificates or biometrics, alone or in combination; (4). Content inspection. Complement desktop anti-virus measures with gateway software and firewall application proxies that can block malicious code; (5). System and server integrity. Many exploits allow attackers to gain administrative control of operating systems and access file systems; (6). Information integrity. Use file system encryption to protect stored data, especially on laptops and PDAs; (7). Availability. Identify mission-critical servers, security systems and network connections, and determine where you need high availability, redundancy, mirroring and diversity; (8). Access Controls. Access controls enforce security and acceptable use policies; (9). Intrusion prevention, detection and rejection. While intrusion detection provides a valuable security service, consider building your networks to be immune to attacks and (10). Auditing and Logging. Log, log, log.., then log some more. Logging and auditing are like blood tests, x-rays and MRIs. They tell you what's happening in your network (Lisa Phifer and David M. Piscitello 2002)."

Robin L. Wakefield (2004) highlights the importance of information security by analyzing the present threats and methods adopted by the organizations to counter those threats. He believes that the best tool to fight spam is the content-filtering software. He reveals, "Content security involves using electronic means to monitor the transmission and storage of data over a company's network. Content- filtering software can stop spam, scan attachments for inappropriate language, block dangerous attachments, stop intellectual property breaches, quarantine questionable messages or embedded images, and notify systems managers when policies are violated. (Robin L. Wakefield, 2004)."

Michael J. Blotzer (2002) analysis the various spam-filtering softwares presently being used. He reveals the operating methods of these softwares: "Spam filtering software screens e-mail before it's downloaded by your email software. The spam filter scans email waiting on your e-mail server and looks for signs that a message is spam based on a set of defined rules. The rules can include known spam e-mail addresses, spam IP addresses, suspicious e-mail addresses and key words in the subject or body of an e-mail... The spam filter then presents a list of all waiting e-mail, flagging the potential spam. A quick review, followed by a click of a button, deletes the flagged spam at the server, before it is downloaded to your computer (Michael J. Blotzer, 2002)."

Lastly, after analyzing all the present solutions the industry has to offer, he discloses his favorite spam-filtering software, "In my evaluation, Novasoft's SpamKiller stood head and shoulders...

SpamKiller came pre-configured with an extensive set of known spammers and e-mail cues. In addition, SpamKiller can be set to accept all mail from an email list. With other programs, I spent so much time establishing filtering criteria that it was easier to manually trash my spam (Michael J. Blotzer, 2002)."
Peter Piazza (2002) examines the usefulness of spam filtering tools presently being used. He reveals that while corporate gateways are useful against blocking viruses, they are useless against blocking spam. However, he writes, "Filters can also be used to block mail from particular senders, although that's less useful, and content filters (which can be configured by the end-user or the system administrator) can block attachments that don't have a valid business purpose, such as [MP.sub.3] files."

Furthermore, Peter Piazza (2004) discusses the success of two companies in the battle against spam. These companies have used spam filters, which, "attempt to identify the characteristics common to spam and then customize filters to block those identifiers; they look for technical clues in a message indicating that it is probably spam; and they block addresses believed to be used by spammers (Peter Piazza, 2004)."

Rebecca Wetzel (2004) discusses various initiatives being taken to discourage spam. These include consistently upgrading technology and adding payment structures for spammers in order to discourage them Rebecca Wetzel primarily discusses two forms of spam filter tools, (1) content-based filtering and (2) sender-based filtering. While explaining content-based filters, she writes, "Content-based filters draw on a variety of spam identification methods ranging from pattern recognition to recipient complaint systems to Bayesian filtering, a technique that uses words or character strings to identify email as spam, and learns to identify new spam the more incoming email it analyzes (Rebecca Wetzel 2004)." And while classifying sender-based filters, she reveals, "Sender-based filtering blocks based on a sender's reputation -- with filtering decisions made using information in 'black lists' or 'white lists'. Email from senders of ill repute is filtered, whereas email from 'white-listed' senders is always allowed through (Rebecca Wetzel 2004)."

Despite the fact that spam filtering tools are very helpful in blocking unwanted emails, Rebecca reveals some of the disadvantages about these filters. "Filtering can effectively reduce spam on the network and/or at the desktop, but it can have drawbacks. The higher the spam capture rate, the greater the chance of blocking wanted email. No matter how low the risk, undelivered email can hurt business (Rebecca Wetzel 2004)."

Jason Catlett (1998) discusses the present laws related to spamming and also briefly touches upon the subject of spam filtering tools. She critically evaluates the present spam blocking tools being used by ISPs and reveals the challenges and disappointments associated with the use of spam filtering tools. She writes, "The people and companies who provide Internet access to millions of consumers bear the brunt of complaints about spam, and every day they fight hundreds of unseen battles to stem its flow. A highly sophisticated arms race of blocking and filtering software is being waged, and administrators are starting to gain the upper hand, with updates of blacklists being propagated before spammers can switch to their next target. The problem is that such action requires constant vigilance and is very expensive to maintain because of the high level of expertise required to adapt filters continuously to new spamming tactics. Like intelligence agencies, their failures are trumpeted while their victories go unnoticed. Large companies are finding that they have to use similar measures to prevent their employees' time being wasted by spam (Jason Catlett, 1998)."

While concluding her study she writes, "There is no simple solution to junk e-mail. It was born of the freedom and affluence brought by the Internet, and, as long as we enjoy those qualities, we all can expect to have to struggle against junk (Jason Catlett, 1998)."

Lastly, Jason Levitt (2003) discusses the present concepts and tools related to spam filtering solutions, such as, blacklists, white lists, content filtering and machine learning. On the subject of blacklists and white lists, he writes, "Several third-party organizations maintain blacklists, sometimes called real-time black-hole lists, or RBLs, or block-lists, which are lists of IP addresses or domain names that are known to be originators of spam. Businesses can decrease the amount of spam they receive by subscribing to blacklists and blocking any E-mail traffic originating from the IP addresses or domain names listed on the blacklists (Jason Levitt, 2003)," and while writing on the subject of content filtering and machine learning, he discloses, "Content filtering, the filtering of E-mail based…

Sources used in this document:
Bibliography

Andy Dornan. Lesson 188: Bayesian Spam Filtering. Network Magazine; 3/1/2004.

Celia Wren. Spam Wars: Battling the Relentless Web Tide. Commonweal, Vol. 130, February 14, 2003

Eric Krapf. Do Not Spam. Business Communications Review, Vol. 33, October 2003

Fred S. Knight. Spam-Help Is on the Way. Business Communications Review, Vol. 34, May 2004
Cite this Document:
Copy Bibliography Citation

Related Documents

SPAM: Unwanted Email
Words: 2858 Length: 11 Document Type: Term Paper

spam has a rather innocuous and interesting background. The name comes from the Monty Python comedy sketch in which a group of Vikings in a restaurant start singing "Spam, spam, spam, spam, lovely spam! Wonderful spam!" They annoy the waiter who tells them to shut up. The interpretation of the 'action' rather than the meaning of the word itself refers to a repetitive act that annoys. In terms of

Wide Web Is Available Around
Words: 14250 Length: 52 Document Type: Term Paper

The reward for the effort of learning is access to a vocabulary that is shared by a very large population across all industries globally" (p. 214). Moreover, according to Bell, because UML is a language rather than a methodology, practitioners who are familiar with UML can join a project at any point from anywhere in the world and become productive right away. Therefore, Web applications that are built using

Business Productivity the Affects of
Words: 6188 Length: 23 Document Type: Research Proposal

The objectives of this project will result in a reduced security risk due to incoming spam and junk email messages. Achievement of the objective will be difficult to measure because it represent something that will not happen if the project is successful. A reduction in threats due to the actions or inactions of employees will result in achievement of these objectives. An employee questionnaire or survey would be useful in

Use of Content Filters on Internet in High School
Words: 14424 Length: 42 Document Type: Term Paper

Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's

Firms Took Decidedly Different Approaches Towards Solving
Words: 821 Length: 3 Document Type: Essay

firms took decidedly different approaches towards solving a problem that continually plagues many companies of various sizes. Those firms included; First Banking Services of Florida, Charter Communications and Pier One Imports and the problem they all three faced was spam email. SPAM email may not seem a likely culprit for trouble but Charter recognized that over fifty percent of the email it was receiving was spam, while Pier One Imports

Malware Since the Earliest Days
Words: 1957 Length: 6 Document Type: Term Paper

However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now