We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Computer Security - Essay Example

Comments (0)
Summary
Q: What is the true loss and cost of spam? Why have systemic spam responses not been adopted? Argue for how would spam have to cost and to whom to end it. How would this change the infrastructure? How has spam already changed the infrastructure? With the advancement of technology an the internet being used for a multitude of purposes we can see how important a role the internet plays in the lives of individuals as well as corporations by viewing the estimate of about 50 billion messages being sent per day by the current volume of emails sent worldwide…
Download full paper
GRAB THE BEST PAPER
Computer Security
Read TextPreview

Extract of sample
Computer Security

Download file to see previous pages... These measures although controversial and undefined currently in their basic emphasis and in all certainty aim to reduce free access, ease of use, timeliness and the completely cost effective advantages that attract such a high level of abuse to the facility. This in itself is a true loss with legitimate users caught in the cross fire and being on the receiving end of all the barriers that are proposed to the easy usage of email and web access. The core problem with spam is that it bears the senders almost no cost to send the spam. The network service providers and the recipients bear the cost. Hence the cost associated with spam weighs down on the receivers in terms of reduced convenience and higher cost resulting from the proposed proof of work that aims to alter the economics of spam, by requiring that the send commit to a per-email cost. There are many reasons why a systemic spam response has not been adopted. This is mainly because the proposed responses lack in suitable aspects and hence cannot be generally adopted as a counter for the issue at hand. This issue being largely the enabling factor that spam is cheap to send. The most original and highly examined model to deter spam is the proof-of-word model. This comprises a set of proposals, in which email senders would be required to pay money, perform a resource-intensive computation, perform a series of memory operations, or post a bond for each message sent. The working assumption of this model was to deter spam by making it uneconomic to send a large number of messages, while enabling legitimate users to send small number of messages. Hence proof of work reverses the cost model of email by charging the sender instead of the user. All these components of the proof of work model seem promising however a uniform POW mechanism will not. Firstly because if it is expensive enough to stop spammers it must be so expensive that it will also stop legitimate users. Infact, the cost to a spammer would have to be a magnitude higher than the cost to a legitimate user because spammers face very different production costs due to spambots. The model does not accommodate these variable magnitudes. Second it is proposed that POW might work if it is combined with anti spam efforts such as reputation systems and per-email spam identification mechanisms. However criticism of this approach is based on the fact that these efforts suffer from penalizing new IP addresses and discarding incorrectly identified email which is a type of effort difficult to balance and will result in either new entrants being not allowed to send email, or each ne IP address will be allowed to send enough email that spam remains profitable. Changes to the current infrastructure are necessary to counter spam. It is suggested in various researches that unsolicited bulk email is such a problem on the internet mainly because the current economic framework and the basic infrastructure for email handling does little to discourage it. It ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Computer Security
He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran Tromer, 2008).
8 Pages(2000 words)Essay
Computer security
There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken.
6 Pages(1500 words)Essay
Computer security
The following are the major, recent computer security threats: Blended threats This refers to a combination of spyware and malware attacks on a computer. This is the major current threat, where the attackers are blending malware software with spyware software and sending them to individual emails or chat rooms in form of a URL link (Trend Micro, 2008).
3 Pages(750 words)Essay
Computer Security
Computer networking has been developed over the years and this has brought many advantages in the today's business society. With computer networks, it is possible to share resources and information. Information can be stored in a common location and this location be put in a network where everyone who can access the network will have the chance to access it and therefore save them the trouble of having to look for that information and carry it using external storage devices.
4 Pages(1000 words)Essay
Computer Security
As the severity of cyber threats become increasingly more sophisticated because of the alternating reasons behind hacking, so are the set strategies to aid in combating them. Current techniques to provide digital security are executed with a woefully inadequate strategy, considering a frighteningly short time horizon.
30 Pages(7500 words)Essay
Computer Security
Both of the studies featured in this essay are similar in the sense that these studies are aimed towards enhancing computer security in organizations. However, the studies differ in the study goals and scope, methodology and analysis. The importance of computer security has been emphasized by two expert studies.
9 Pages(2250 words)Essay
Computer security
The articles state that these firms have realized that commonly installed open software from Oracle Corporation makes PCs vulnerable to hacker hits. In response, there is no means of protecting users. Additionally, the articles say that computer scholars
1 Pages(250 words)Essay
Computer security
In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the
1 Pages(250 words)Essay
Computer security
The report stipulates that computer security licensing, is indeed an antisocial behavior that harbors social cohesion. However, it has contributed efficiently to reducing computer fraud over the years.
6 Pages(1500 words)Essay
Computer Security
First, I discovered that I was a bit careless with storage of my personal computer which is portable since I often leave it on top of the table when out of the house and whenever I carry it around or when travelling I normally left
1 Pages(250 words)Essay
Let us find you another Essay on topic Computer Security for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us