We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Computer Security - Essay Example

Comments (0) Cite this document
Summary
Download paper
GRAB THE BEST PAPER
Computer Security
Read TextPreview

Extract of sample
Computer Security

These measures although controversial and undefined currently in their basic emphasis and in all certainty aim to reduce free access, ease of use, timeliness and the completely cost effective advantages that attract such a high level of abuse to the facility. This in itself is a true loss with legitimate users caught in the cross fire and being on the receiving end of all the barriers that are proposed to the easy usage of email and web access. The core problem with spam is that it bears the senders almost no cost to send the spam. The network service providers and the recipients bear the cost. Hence the cost associated with spam weighs down on the receivers in terms of reduced convenience and higher cost resulting from the proposed proof of work that aims to alter the economics of spam, by requiring that the send commit to a per-email cost. There are many reasons why a systemic spam response has not been adopted. This is mainly because the proposed responses lack in suitable aspects and hence cannot be generally adopted as a counter for the issue at hand. This issue being largely the enabling factor that spam is cheap to send. The most original and highly examined model to deter spam is the proof-of-word model. This comprises a set of proposals, in which email senders would be required to pay money, perform a resource-intensive computation, perform a series of memory operations, or post a bond for each message sent. The working assumption of this model was to deter spam by making it uneconomic to send a large number of messages, while enabling legitimate users to send small number of messages. Hence proof of work reverses the cost model of email by charging the sender instead of the user. All these components of the proof of work model seem promising however a uniform POW mechanism will not. Firstly because if it is expensive enough to stop spammers it must be so expensive that it will also stop legitimate users. Infact, the cost to a spammer would have to be a magnitude higher than the cost to a legitimate user because spammers face very different production costs due to spambots. The model does not accommodate these variable magnitudes. Second it is proposed that POW might work if it is combined with anti spam efforts such as reputation systems and per-email spam identification mechanisms. However criticism of this approach is based on the fact that these efforts suffer from penalizing new IP addresses and discarding incorrectly identified email which is a type of effort difficult to balance and will result in either new entrants being not allowed to send email, or each ne IP address will be allowed to send enough email that spam remains profitable. Changes to the current infrastructure are necessary to counter spam. It is suggested in various researches that unsolicited bulk email is such a problem on the internet mainly because the current economic framework and the basic infrastructure for email handling does little to discourage it. It ... Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Essay Example | Topics and Well Written Essays - 750 words - 5”, n.d.)
Retrieved from https://studentshare.net/environmental-studies/25813-computer-security
(Computer Security Essay Example | Topics and Well Written Essays - 750 Words - 5)
https://studentshare.net/environmental-studies/25813-computer-security.
“Computer Security Essay Example | Topics and Well Written Essays - 750 Words - 5”, n.d. https://studentshare.net/environmental-studies/25813-computer-security.
  • Cited: 0 times
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Computer Security
8 Pages(2000 words)Essay
Computer security
6 Pages(1500 words)Essay
Computer security
3 Pages(750 words)Essay
Computer Security
4 Pages(1000 words)Essay
Computer Security
30 Pages(7500 words)Essay
Computer Security
9 Pages(2250 words)Essay
Computer security
1 Pages(250 words)Essay
Computer security
1 Pages(250 words)Essay
Computer security
6 Pages(1500 words)Essay
Computer Security
1 Pages(250 words)Essay
Let us find you another Essay on topic Computer Security for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us