0% found this document useful (0 votes)
22 views89 pages

Protecting Application or System Software

Uploaded by

sisaytekele6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views89 pages

Protecting Application or System Software

Uploaded by

sisaytekele6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 89

Unit of Competence:

Protecting Application or
System Software
 LO1- Ensure user accounts
are controlled
 This guide will also assist you to attain
the learning outcome stated in the cover
page.
 Specifically, upon completion of this
Learning Guide, you will be able to –
06/03/2024 1
 Modifying previously created user
settings to ensure they conform to
updated security policy.
 Modifying default user settings to ensure
that they conform to security policy.
 Ensuring legal notices displayed at logon
are appropriate.
 Checking the appropriate utilities for
strength passwords and consider
tightening rules for password complexity.
 Monitoring emails uncover breaches in
compliance with legislation.
06/03/2024 2
 Accessing information services to identify
security gaps and take appropriate action
using hardware and software or patches.
 User Account Control/ Security
Considerations in Computer Support and
Operations.
 What is User Account Control?
 User Account Control (UAC) is a security
component that enables to users perform
common tasks as non-administrators
(called standard users in Windows Vista),
and as administrators without having to
switch users, log off, or use Run As.
06/03/2024 3
 User accounts are a members of the local
Administrators group run most
applications as a standard user.
 By separating user and administrator
functions.
 UAC helps users move toward using
standard user rights by default.
 When an administrator logs on to a
computer that is running Windows 7 or
Windows Vista user is assigned two
separate access tokens.
 Access tokens, which contain a user's
group membership and -
06/03/2024 4
-authorization and access control data, are
used by the Windows operating system to
control what resources and tasks the user
can access.
 The access control model in earlier
Windows operating systems did not include
any failsafe checks to ensure that users
truly wanted to perform a task that required
their administrative access token.
 As a result, malicious software could
install on users' computers without
notifying the users.
 (This is sometimes referred to as a "silent"
installation.) 06/03/2024 5
 Even more damaging, because the user is
an administrator, the malicious software
could use the administrator's access
control data to infect core operating
system files, and in some instances,
become nearly impossible to remove.
 The primary difference between a
standard user and an administrator is the
level of access that the user has over core,
protected areas of the computer.
 Administrators can change the system
state, turn off the firewall, configure
security policies, install a service or-
06/03/2024 6
- a driver that affects every user on the
computer, and install software for the
entire computer.
Standard users cannot perform these
tasks, and they can only install per-user
software.
During the logon process, authorization
and access control components that
identify an administrator are removed,
resulting in a standard user access token.
The standard user access token is then
used to start the desktop, the Explorer.exe
process. 06/03/2024 7
 Because all applications inherit their access
control data from the initial launch of the
desktop, they all run as a standard user.
 Security considerations in computer
support and operations
 Computer support and operations refers to
everything done to run a computer system.
 This includes both system administration and
tasks external to the system that support its
operation (e.g., maintaining documentation).
 It does not include system planning or
design.
06/03/2024 8
 Support and operations are routine activities
that enable computer systems to function
correctly.
 These include fixing software or hardware
problems, loading and maintaining software,
and helping users resolve problems.
 The support and operation of any computer
system, from a three-person local area
network .
 A world wide web application serving
thousands of users, is critical to maintaining
the security of a system.
06/03/2024 9
 Computer security system literature includes
many examples of how organizations.
 undermined their often expensive security
measures because of poor documentation, old
user accounts, conflicting software, or poor
control of maintenance accounts.
 an organization's policies and procedures
often fail to address many of these important
issues.
 The important security considerations within
some of the major categories of support and
operations are:-
06/03/2024 10
- User support,
- Software support,
- Configuration management,
- Backups,
- Media controls,
- Documentation, and maintenance.
 User support:- In many organizations,
user support takes place through a Help Disk.
 Help Disks can support an entire
organization, a subunit, a specific system, or
a combination of these.
06/03/2024 11
 For smaller systems, the system
administrator normally provides direct user
support.
 Experienced users provide informal user
support on most systems.
 User support should be closely linked to the
organization's incident handling capability.
 An important security consideration for user
support personnel is being able to recognize
which problems (brought to their attention by
users) are security- related.

06/03/2024 12
 For example, users' inability to log onto a
computer system may result from the
disabling of their accounts due to too many
failed access attempts.
 This could indicate the presence of hackers
trying to guess users' passwords.
 A wide range of possible security problems
exist.
 Additionally, problems can be software- or
hardware-based.

06/03/2024 13
 Small systems are especially susceptible to
viruses, while networks are particularly
susceptible to hacker attacks, which can be
targeted at multiple systems.
 Software Support
 Software is the heart of an organization's
computer operations,whatever the size and
complexity of the system.
 There are many elements of software support.
 One is controlling what software is used on a
system.
 If users or systems personnel can load and
execute any software on a system.
06/03/2024 14
 One method of controlling software is to
inspect or test software before it is loaded.
 (E.g., to determine compatibility with custom
applications or identify other interactions).
 This can apply to new software packages, to
upgrades.
 In addition to controlling the loading and
execution of new software.
 Utility software is system
software designed to help analyze, configure,
optimize or maintain a computer.
 It is a type of system software, used to
support the computer infrastructure.
06/03/2024 15
 Utility software is used to perform basic
maintenance tasks on a computer.
 E.g. disk utilities like defragmenters,
compressors and cleaners.
 Utility software helps the user to control,
manage, and maintain a computer's operating
system, hardware and application software.
 Organizations should also give care to the
configuration and use of powerful system
utilities.
 System utilities can compromise the integrity
of operating systems and logical access
controls. 06/03/2024 16
 Viruses take advantage of the weak software
controls in personal computers.
 Also, there are powerful utilities available for
PCs that can restore deleted files, find hidden
files, and interface directly with PC hardware,
bypassing the operating system.
 A second element in software support can be
to ensure that software has not been modified
without proper authorization.
 Many organizations also include a program to
ensure that software is properly licensed, as
required
06/03/2024 17
 For example, an organization may audit
systems for illegal copies of copyrighted
software.
 Configuration Management
closely related to software support.
 Configuration management are normally
addresses hardware, software, networking,
and other changes; it can be formal or
informal.
 The primary security goal of configuration
management is ensuring that changes to the
system do not unintentionally or unknowingly
06/03/2024 18
 For networked systems, configuration
management should include external
connections.
 Is the computer system connected?
 To what other systems?
 Inturn, to what systems are these systems and
organizations connected?
 A second security goal of configuration
management is ensuring that changes to the
system are reflected in other documentation,
such as the contingency plan.

06/03/2024 19
 If the change is major, it may be necessary to
reanalyze some or all of the security of the
system.
 Backups
 Support and operations personnel and
sometimes users back up software and data.
 This function is critical to contingency
planning.
 Program managers should be consulted to
determine what backup schedule is
appropriate.
 A safety measure, it is useful to test that
06/03/2024 20
 Finally,backups should be stored securely, as
appropriate.
 Users of smaller systems are often
responsible for their own backups.
 Some organizations, therefore, task support
personnel with making backups periodically.
 for smaller systems, either automatically
(through server software) or manually (by
visiting each machine).
 Media Controls:-

06/03/2024 21
 Media controls include a variety of measures
to provide physical and environmental
protection and accountability for tapes,
diskettes, printouts, and other media.
 From a security perspective, media controls
should be designed to prevent the loss of
confidentiality, integrity, or availability of
information, including data or software,
when stored outside the system.
 This can include storage of information
before it is input to the system and after it is
output.
06/03/2024 22
 The extent of media control depends upon
many factors, including the type of data, the
quantity of media, and the nature of the user
environment.
 Physical and environmental protection is
used to prevent unauthorized individuals from
accessing the media.
 It also protects against such factors as heat,
cold, or harmful magnetic fields.
 When necessary, logging the use of
individual media.

06/03/2024 23
 (E.g. a tape cartridge) provides detailed
accountability - to hold authorized people
responsible for their actions.
 Marking:-
 Controlling media may require some form of
physical labeling.
 The labels can be used to identify media with
special handling instructions, to locate needed
information, or to log media.
 (E.g., with serial/control numbers or bar
codes) to support accountability.
06/03/2024 24
 Identification is often by colored labels on
diskettes or tapes or banner pages on
printouts.
 If labeling is used for special handling
instructions, it is critical that people be
appropriately trained.
 The marking of PC input and output is
generally the responsibility of the user, not the
system support staff.
 Marking backup diskettes can help prevent
them from being accidentally overwritten.

06/03/2024 25
 Logging:-
 The logging of media is used to support
accountability.
 Logs can include control numbers (or other
tracking data).
 The times and dates of transfers, names and
signatures of individuals involved, and other
relevant information.
 Integrity Verification:-
 when electronically stored information is read
into a computer system, it may be necessary to
determine whether it has been read correctly or
06/03/2024 26
 The integrity of electronic information can be
verified using error detection and correction
or, if intentional modifications are a threat,
cryptographic-based technologies.
 Physical Access Protection:-
 Media can be stolen, destroyed, replaced with
a look-alike copy, or lost.
 Physical access controls which can limit
these problems include locked doors, desks,
file cabinets, or safes.
 If the media requires protection at all times, it
may be necessary to actually output data to
the media in a secure location.
06/03/2024 27
 (E.g., printing to a printer in a locked room
instead of to a general-purpose printer in a
common area).
 Physical protection of media should be
extended to backup copies stored offsite.
 They generally should be accorded an
equivalent level of protection to media
containing the same information stored onsite.
 The controls at the off-site location are quite
likely to be different from the controls at the
regular site.

06/03/2024 28
Environmental Protection
 Magnetic media, such as diskettes or
magnetic tape, require environmental
protection.
 since they are sensitive to temperature,
liquids, magnetism, smoke, and dust. Other
media.
 (E.g., paper and optical storage) may have
different sensitivities to environmental
factors.

06/03/2024 29
 Disposition
 when media is disposed of, it may be
important to ensure that information is not
improperly disclosed.
 This applies both to media that is external to
a computer system (such as a diskette) and to
media inside a computer system, such as a
hard disk.
 The process of removing information from
media is called sanitization.
 Three techniques are commonly used for
media sanitization:
06/03/2024 30
 Overwriting,
 Degaussing, and
 Destruction.
 Overwriting :- is an effective method for clearing
data from magnetic media.
 As the name implies, overwriting uses a program
to write (1s, 0s, or a combination) onto the media.
 Common practice is to overwrite the media three
times.
 Overwriting should not be confused with merely
deleting the pointer to a file (which
typicallyhappens when a delete command is used).
06/03/2024 31
 Degaussing :-is a method to magnetically
erase data from magnetic media.
 Two types of degaussed exist: strong
permanent magnets and electric degausses.
 The final method of sanitization is
destruction of the media by shredding or
burning.
 Many people throw away old diskettes,
believing that erasing the files on the diskette
has made the data unretrievable.
 In reality, however, erasing a file simply
removes the pointer to that file.
06/03/2024 32
 The pointer tells the computer where the file is
physically stored.
 Destruction:- the action or process of causing
so much damage to something that it no longer
exists or cannot be repaired.
 Documentation
 In computer hardware and software product
development, documentation is the information
that describes the product to its users.
 It consists of the product technical manuals
and online information (including online
versions of the technical manuals and help
facility descriptions).06/03/2024 33
 Computers. manuals, listings, diagrams, and
other hard- or soft-copy written and graphic
materials that describe the use, operation,
maintenance, or design of software or
hardware:
 Technical: Manuals, instructions, tutorials,
procedures, specifications, etc.,
 That a company a piece of equipment or
software, and provide guidance for its proper
use and maintenance.
 This includes many types of documentation,
such as security plans, contingency plans,
risk analyses, and security policies and
06/03/2024 Protect Application or System Software 34
 Security documentation should be designed to
fulfill the needs of the different types of people
who use it.
 A security procedures manual for systems
operations and support staff may address a
wide variety of technical and operational
concerns in considerable detail.
 Maintenance
 System maintenance requires either physical
or logical access to the system.
 Support and operations staff, hardware or
software vendors, or third-party service
providers may maintain a system.
06/03/2024 35
 Computer maintenance:-
is the practice of keeping computers in a good
state of repair.
 Usually performed by a computer repair
technician, this service addresses the different
ways
 Maintenance may be performed on site, or it
may be necessary to move equipment to a
repair site.
 Maintenance may also be performed
remotely via communications connections.

06/03/2024 36
 Inter dependencies
Support and operations components coexist in
most computer security controls.
Personnel Most support and operations staff
have special access to the system.
Incident Handling Support and
operations may include an organization's
incident handling staff.
Even if they are separate organizations, they
need to work together to recognize and
respond to incidents.
06/03/2024 37
 Contingency Planning.
 Support and operations normally provides
technical input to contingency planning and
carries out the activities.
(E.g.,) making backups, updating
documentation, and practicing responding to
contingencies.
Security Awareness, Training, and Education.

Support and operations staff should be trained


in security procedures and should be aware of
the importance of security.
06/03/2024 38
In addition, they provide technical expertise
needed to teach users how to secure their
systems.
Physical and Environmental Support and
operations staff often control the immediate
physical area around the computer system.
Technical Controls The technical controls
are installed, maintained, and used by support
and operations staff.
They create the user accounts, add users to
access control lists.

06/03/2024 39
 Cost Considerations
The cost of ensuring adequate security in day-
to-day support and operations is largely
dependent upon the size and characteristics of
the operating environment and the nature of
the processing being performed.

06/03/2024 40
LO2 - Detect and Removed
Destructive Software
Computer Virus
 A computer virus, much like a flu virus, is
designed to spread from host to host and has
the ability to replicate itself.
 Similarly, in the same way that viruses cannot
reproduce without a host cell.
 computer viruses cannot reproduce and
spread without programming such as a file or
document.
06/03/2024 Protecting Application or System Sof 41
 A computer virus is a type of malicious code
or program written to alter the way a
computer operates and that is designed to
spread from one computer to another.
 Viruses - A virus is a small piece of software
that piggybacks on real programs.
 Each time the spreadsheet program runs, the
virus runs, too, and it has the chance to
reproduce (by attaching to other programs) or
wreak havoc.

06/03/2024 42
How does a computer virus attack?
 Once a virus has successfully attached to a
program, file, or document.
 the download package was injected with a
virus and the computer is now infected (this
problem actually occurs very often).
 E-mails are spoofed to look legitimate and
contain an attachment or link that will infect
your machine when clicked on.

06/03/2024 43
How Does Computer Virus Spread?
 For a computer virus to spread through a
computer system, or network, it must be
activated.
 This means that the file that contains the
virus must be opened, or executed in order
for the virus to come to life.
 After it gets activated, these viruses look for
certain programs to infect.
 The main and the important that you must
note is all viruses seem to do well is
duplicate themselves within the programs.
06/03/2024 44
 This is the main reason as to how they spread
well.
 E-mail viruses - An e-mail virus travels as an
attachment to e-mail messages, and usually
replicates itself by automatically mailing itself
to dozens of people in the victim's e-mail
address book.
 Trojan horses - A Trojan horse is simply a
computer program.
 The program claims to do one thing (it may
claim to be a game) but instead does damage
when you run it (it may erase your hard disk).
06/03/2024 45
 Trojan horses have no way to replicate
automatically.
 Worms - A worm is a small piece of
software that uses computer networks and
security holes to replicate itself.
 A copy of the worm scans the network for
another machine that has a specific security
hole.
 It copies itself to the new machine using the
security hole, and then starts replicating from
there, as well.

06/03/2024 46
 Virus Origins
 Computer viruses are called viruses because
they share some of the traits of biological
viruses.
 A computer virus passes from computer to
computer like a biological virus passes from
person to person.
 A computer virus shares some of these traits.
 A computer virus must piggyback on top of
some other program or document in order to
launch.

06/03/2024 47
 Once it is running, it can infect other
programs or documents.
 People write computer viruses.
 A person has to write the code, test it to make
sure it spreads properly and then release it.
 A person also designs the virus's attack
phase, whether it's a silly message or the
destruction of a hard disk.

06/03/2024 48
 Virus History
 Traditional computer viruses were first
widely seen in the late 1980s, and they came
about because of several factors.
 The first factor was the spread of personal
computers (PCs).
 The second factor was the use of
computer bulletin boards.
 People could dial up a bulletin board with
a modem and download programs of all types.

06/03/2024 49
 Games were extremely popular, and so were
simple word processors, spreadsheets and
other productivity software.
 Bulletin boards led to the precursor of the
virus known as the Trojan horse.
 A Trojan horse is a program with a cool-
sounding name and description.
 So you download it.
 Virus Evolution
 Viruses and worms get a lot of publicity, but
they aren't the only threats to your computer's
health.
06/03/2024 50
 Steps in protecting your computer
from Viruses
 You can protect yourself against viruses with
a few simple steps:
 If you are truly worried about traditional (as
opposed to e-mail) viruses, you should be
running a more secure operating system
likeUNIX.
 If you are using an unsecured operating
system, then buying virus protection
software is a nice safeguard.

06/03/2024 51
 The more layers of defense, the harder for
hackers to use your computer.
 Here are five simple, but critical steps to
protect your computer,
 Install Firewall
 Install Antivirus Software
 Install Anti-Spyware Software
 Use Complex and Secure Passwords
 Check on the Security Settings of the
Browser

06/03/2024 52
 You should make sure that Macro Virus
Protection is enabled in all Microsoft
applications.
 You should never double-click on an e-mail
attachment that contains an executable.
 Attachments that come in as Word files
(.DOC), spreadsheets (JPG) graphic file
(.XLS), images (.GIF), etc., are
 Data files and they can do no damage (noting
the macro virus problem in Word and Excel
documents mentioned above).

06/03/2024 53
 Anti Virus Software
 Antivirus or anti-virus software is used to
prevent, detect, and remove malware,
including but not limited to computer
viruses, computer worm, trojan
horses, spyware and adware.
 Signature based detection is the most
common method. To identify viruses and
other malware, antivirus software compares
the contents of a file to a dictionary of virus
signatures.

06/03/2024 54
As new viruses are being created each day, the
signature-based detection approach requires
frequent updates of the virus signature
dictionary.
To assist the antivirus software companies, the
software may allow the user to upload new
viruses or variants to Because viruses can
embed themselves in existing files, the entire
file is searched, not just as a whole, but also in
pieces.
Heuristic-based detection, like malicious
activity detection, can be used to identify
06/03/2024 55
File emulation is another heuristic approach.
File emulation involves executing a program
in a virtual environment and logging what
actions the program performs.
Depending on the actions logged, the
antivirus software can determine if the
program is malicious or not and then carry out
the appropriate disinfection actions.

06/03/2024 56
Rootkit detection
Anti-virus software can also scan for rootkits;
a rootkit is a type of malware that is designed
to gain administrative-level control over a
computer system without being detected.
Rootkits can change how the operating
system functions and in some cases can
tamper with the anti-virus program and render
it ineffective. Rootkits are also difficult to
remove, in some cases requiring a complete
re-installation of the operating system

06/03/2024 57
New viruses
Anti-virus programs are not always effective
against new viruses, even those that use non-
signature-based methods that should detect
new viruses.
 The reason for this is that the virus designers
test their new viruses on the major anti-virus
applications to make sure that they are not
detected before releasing them into the wild

06/03/2024 58
Damaged files
Files which have been damaged by computer
viruses are normally damaged beyond
recovery. Anti-virus software removes the
virus code from the file during disinfection,
but this does not always restore the file to its
undamaged state. In such circumstances,
damaged files can only be restored from
existing backups; installed software that is
damaged requires re-installation.

06/03/2024 59
Firmware issues
Active anti-virus software can interfere with
a firmware update process. Any writeable
firmware in the computer can be infected by
malicious code.
This is a major concern, as an
infected BIOS could require the actual BIOS
chip to be replaced to ensure the malicious
code is completely removed.
Anti-virus software is not effective at
protecting firmware and
the motherboard BIOS from infection.[
06/03/2024 60
Network firewall
 Network firewalls prevent unknown
programs and processes from accessing the
system.
 they are not antivirus systems and make no
attempt to identify or remove anything. They
may protect against infection from outside the
protected computer or network, and limit the
activity of any malicious software which is
present by blocking incoming or outgoing
requests on certain TCP/IP ports.

06/03/2024 61
 A firewall is designed to deal with broader
system threats that come from network
connections into the system and is not an
alternative to a virus protection system.
 Most people have antivirus software, but this
can be much more effective when used along
with firewall protection.

06/03/2024 62
 A good analogy is with a firewall in a
building: just as in a building a firewall is
meant to keep the fire from spreading out, the
computer firewall is meant to keep threats
from entering your network and spreading to
other computers.
 “A very basic one is that in which companies
utilize firewall to block some sites and/or files
attached to emails, thus preventing people
from accessing sites that might be harmful to
the company’s network or that might receive
some type of virus through email.”
06/03/2024 63
 There are two types of firewall: software
and hardware. The software is a program that
monitors the network traffic. Newer versions
of Windows, such as Windows XP Service
Pack 2 already come with the software
installed as default. This is mostly used by
single computers.
 The hardware firewall is a device that you
can install at the point where your network
connects to the Internet.

06/03/2024 64
 Online scanning
 Some antivirus vendors maintain websites
with free online scanning capability of the
entire computer, critical areas only, local
disks, folders or files.
 One of the first things that malicious software
does in an attack is disable any existing
antivirus software and sometimes the only
way to know of an attack is by turning to an
online resource that isn't already installed on
the infected computer.

06/03/2024 65
 LO3: Identify and take action to
stop spam
SPAM :-Spam(send unwanted or junk e-
mai) is flooding the Internet with many
copies of the same message, in an attempt
to force the message on people who would
not otherwise choose to receive it.
 Email spam targets individual users with
direct mail messages. Email spam lists
are often created by scanning Usenet
postings, stealing Internet mailing lists,
06/03/2024 66
Why is spam bad?
 The free ride (Sit and travel usually while
controlling its motion). E-mail spam is unique
in that the receiver pays so much more for it
than the sender does.
 The “oceans of spam” problem. Many
spam messages say ``please send a REMOVE
message to get off our list.'' Even disregarding
the question of why you should have to do
anything to get off a list you never asked to
join, this becomes completely impossible if
the volume grows. 06/03/2024 67
 They're crooks. Spam software invariably
comes with a list of names falsely claimed to
be of people who've said they want to receive
ads, but actually consisting of unwilling
victims culled at random from usenet or
mailing lists.
 It might be illegal. Some kinds of spam are
illegal in some countries on the Internet.
Especially with pornography, mere possession
of such material can be enough to put the
recipient in jail.

06/03/2024 68
 SPAM Control
 Spam now constitutes an overwhelming
majority of email traffic. The never-ending
onslaught of junk messages strains networks,
erodes user productivity , propagates
dangerous malware and costs business
millions of dollars.
 Types of Spam
 Though all junk email might look the same,
spam continues to arrive in a seemingly
endless number of configurations, ranging
from the innocuous to the lethal.
06/03/2024 69
 Advertising : Spam is used to promote an
entire spectrum of products and services, from
software to real estate to questionable medical
and nutritional offerings.
 Malware Delivery : Spam is one of the main
distribution channels for
delivering viruses and other types of malware.
 Nonsense : A significant chunk of junk-mail
text is pure gibberish. Some of this material is
generated in an effort to trick spam-filtering
technologies into passing an attached message
onto recipients.
06/03/2024 70
 Spam Media
 Spam is overwhelmingly an email problem.
Yet as Internet technology advances, junk
content is rapidly spilling over to many other
types of IP media, including:
 IM (instant messaging) : Spam is a
growing problem on IM networks, where the
threats closely parallel those of email spam.
 VoIP : SPIT (Spam over Internet Telephony)
is a rare but potentially dangerous form of
spam that users and jam voice-mail inboxes.

06/03/2024 71
 Search Engines : Using techniques such as
hidden text, doorway pages and mirror sites.
 Online Video : YouTube and other video-
sharing sites are plagued by video spam.
Combating Spam (Fight against; clash with)
 It sometimes seems as if anti-spam
technologies and methodologies are
proliferating as rapidly as spam itself.
 Spam Filters : A growing number of
technology vendors are targeting spam with
products that are designed to block and
quarantine suspected spam.
06/03/2024 72
 Firewalls : Spam firewalls offload message
filtering from the email server, freeing up
network resources and bandwidth.
 Anti-Malware Technologies : Hardware-
and software-based anti-malware products can
block dangerous attachments from reaching
employees' inboxes.
 White Lists/Black Lists : This feature is
found in many spam filters and client
controls. White lists of trusted email addresses
allow messages to proceed to the user's inbox
unimpeded by any filter or client settings.
06/03/2024 73
-Black lists work in the opposite way, routinely
blocking incoming email from known
offenders.
 Policies : All businesses need a
comprehensive anti-spam policy. Besides
mandating the use of filtering and other good
spam-fighting technologies, the policy should
cover routine workplace practices.

06/03/2024 74
06/03/2024 75
06/03/2024 76
06/03/2024 77
06/03/2024 78
06/03/2024 79
06/03/2024 80
06/03/2024 81
06/03/2024 82
06/03/2024 83
06/03/2024 84
06/03/2024 85
06/03/2024 86
06/03/2024 87
06/03/2024 88
06/03/2024 89

You might also like