Research
activity
MAIL BOMBING
-Choose
ONE (1) method of threat:
MAIL BOMBING
1. Describe the method of threat & how it works.
-It is the spamming of emails to the targeted person or any specific system.
-It can cause crashing to the email server because of the transferring a lot of emails.
-It also can make lagged and crash because the huge emails that have to be download.
How it works
-It will send emails to the targeted person or any specific system.or person.
The mail bombing are used to work to send into the targeted system or even person.
MAIL BOMBING
1. Describe the method of threat & how it works.
-It is the spamming of emails to the targeted person or any specific system.
-It can cause crashing to the email server because of the transferring a lot of emails.
-It also can make lagged and crash because the huge emails that have to be download.
How it works
-It will send emails to the targeted person or any specific system.or person.
The mail bombing are used to work to send into the targeted system or even person.
2. Provide
example how it affect a system.
Below is an example shown about the mail bombing that attack one of the well-known system that is called 'G-mail'. It shows about the huge malicious on mail bombing.
3. Describe how to
prevent such threat.Below is an example shown about the mail bombing that attack one of the well-known system that is called 'G-mail'. It shows about the huge malicious on mail bombing.
There are a lot of ways on how to prevent the mail bombing. It is can be more careful and read every instructions. Next, ignore the unused emails.
References
No comments:
Post a Comment