StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Spam Detection and Categorisation and Network Protection using a Firewall - Lab Report Example

Cite this document
Summary
"Spam Detection and Categorisation and Network Protection using a Firewall" paper examines the solutions implemented by keeping in mind the cost and time constraints for the processing of emails to be filtered. Receiving thousands of emails on the server degrades the performance of the email server…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Spam Detection and Categorisation and Network Protection using a Firewall
Read Text Preview

Extract of sample "Spam Detection and Categorisation and Network Protection using a Firewall"

Download file to see previous pages

The Anti-spam system uses combined key methods for recognizing the relevant datasets required as per defined rules. The anti-spam engine detects the parameters from the email message header, and database stores, and learns the email parameters just like a switch maintaining a MAC table in its database.

The selection of Parameters will depend on the security policy of the organization. The unique identification (UID) or fingerprint will be stored in the database of the anti-spam system against each recipient's email address. Before delivering the email to the recipient, the spam engine searches for the UID of the email which is received on the organization’s domain, so that the processing time can be minimized. The emails of which UID has already been stored in the database will be delivered to the recipient The spam engine proceeds further and check the sender’s IP address and email address in the outbound recipient’s category, if the criteria have been fulfilled, then the email message will be delivered to the recipient.

And if not, the email will be stored in the unknown emails category which can be released after checking whether any new host needs to be added to the safe list. Email size and image parameters can also be defined for providing more restrictions as per IT policy. The Firewall should be deployed in such a way that the traffic, whether it is inbound or outbound should not pass to the organization's critical servers without filtration via the firewall. The rules defined in the firewall device or server should not conflict with other rules. It is not necessary to be aware of the traffic coming from the internet, but it is necessary to filter inbound traffic because the communication between employees may harm the critical server through viruses or unauthorized access. The database and application need to be deployed behind the firewall. The request of any staff to access the intranet and database can be filtered via a firewall. 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Spam Detection and Categorisation & Network Protection using a Lab Report”, n.d.)
Spam Detection and Categorisation & Network Protection using a Lab Report. Retrieved from https://studentshare.org/miscellaneous/1560920-spam-detection-and-categorisation-network-protection-using-a-firewall
(Spam Detection and Categorisation & Network Protection Using a Lab Report)
Spam Detection and Categorisation & Network Protection Using a Lab Report. https://studentshare.org/miscellaneous/1560920-spam-detection-and-categorisation-network-protection-using-a-firewall.
“Spam Detection and Categorisation & Network Protection Using a Lab Report”, n.d. https://studentshare.org/miscellaneous/1560920-spam-detection-and-categorisation-network-protection-using-a-firewall.
  • Cited: 0 times

CHECK THESE SAMPLES OF Spam Detection and Categorisation and Network Protection using a Firewall

Profit Implications of Malware

It relies on computer network to send copies of itself to other computers on the network in an automatic manner.... Worms are known to exploit a zero-day vulnerability that allows them to execute their copies within the same network (Effects of Malware Infections: Avoid the Dangers of Malware Programs )....
15 Pages (3750 words) Annotated Bibliography

Data Backup System over Networks

How database management systems (DBMS) perform the backup/restore operations, How about the automatic and manual backup, what's the data will be restored regarding the network limitation of bandwidth and work time and How we can construct a strong Disaster recovery plan.... The author of this paper "Data Backup System over Networks" examines data types according to its sensitivity, backup methodology an archiving, failure types, disaster recovery planning, data restoring methodology, and the survey on data backup solutions being used in the market place....
21 Pages (5250 words) Dissertation

Subordinate Communication in the Age of Informational Technology

It involves the implementation of multiple levels of data securitization, seeking to protect information from both unauthorized physical and network access and attack.... It would involve our implementing technologies as "(a) boundary controllers, such as firewalls and access control, (b) intrusion detection and (c) ...
8 Pages (2000 words) Assignment

Vulnerability Assessment on your System at Home

Routers can help secure Internet and network gateways.... Vulnerability assessment of the home system and network resources can reveal potential issues that can be addresses before the hacker identifies them.... It is an internal audit of system security and network resources.... Firewalls help to secure the network from unwanted data by packet filtering technologies.... Continuous monitoring of the network vigilance is also an important factor....
14 Pages (3500 words) Essay

Cyber Criminals and Other Data Security Dangers

This paper 'Cyber Criminals and Other Data Security Dangers' gives a detailed overview of data safety odds by discussing true world examples.... The author popularizes the possibilities of ISO 27001 Information Security Management Standard which aims to rectify and mitigate those threats.... ... ...
16 Pages (4000 words) Term Paper

Promoting Information Security in Banking Solutions Inc

Besides, only some key plan participants have been issued with a plan copy, with the rest of the copies being stored on the network.... Redundancies have as well been implemented as the perimeter of the network as seen in the organization's network diagram....
5 Pages (1250 words) Case Study

Tools Used in Tightening Information Security

Information security is about protection of information as well as information systems from unauthorized access, use, leak, disruption, modification, scrutiny, inspection or obliteration.... Basically, information systems has three major portions namely, hardware, software and communications whose main aim is the identification and the application of information security standards as means of protection and prevention, at three heights; physical, personal and organizational....
13 Pages (3250 words) Essay

Design of an Online Shopping System

n online shop is a network system, which assimilates several types of business data into a single catalog.... The aim of this paper "Design of an Online Shopping System" is to design a system to be used for a pet shop to enable their customers to engage in online shopping.... The primary purpose is focused upon the idea of making the online a rather unforgettable and successful for the stakeholders involved....
18 Pages (4500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us