Wednesday, April 10, 2019

SEC - Mail Bombing

Research activity

MAIL BOMBING
-Choose ONE (1) method of threat:

MAIL BOMBING
1. Describe the method of threat & how it works.
-It is the spamming of emails to the targeted person or any specific system.
-It can cause crashing to the email server because of the transferring a lot of emails.
-It also can make lagged and crash because the huge emails that have to be download.

How it works
-It will send emails to the targeted person or any specific system.or person.

The mail bombing are used to work to send into the targeted system or even person.

2. Provide example how it affect a system.

Below is an example shown about the mail bombing that attack one of the well-known system that is called 'G-mail'. It shows about the huge malicious on mail bombing. 




3. Describe how to prevent such threat.
There are a lot of ways on how to prevent the mail bombing. It is can be more careful and read every instructions. Next, ignore the unused emails.

References

Postalinspectors.uspis.gov. (2019). Mail Bombs. [online] Available at: https://postalinspectors.uspis.gov/raddocs/bombs.htm [Accessed 13 Apr. 2019].


Z. Byron Wolf, C. (2019). Here's everything we know after studying the mail bomb packages. [online] CNN. Available at: https://edition.cnn.com/2018/10/26/politics/everything-we-know-mail-bombs/index.html [Accessed 14 Apr. 2019].


SearchSecurity. (2019). What is mail bomb? - Definition from WhatIs.com. [online] Available at: https://searchsecurity.techtarget.com/definition/mail-bomb [Accessed 17 Apr. 2019].

No comments:

Post a Comment

Key considerations for planning and undertaking research

Determine what the key considerations are for planning and undertaking research. Research questions.  Certain research quest...