Abstract
The article explores the issues of protecting information and communication systems and e-mail from unwanted spam or spam attacks. Theoretical information about spam and its types is provided. The main technologies and methods of protecting communication systems from spam and spam attacks are formulated. The influence of spam on the activity and work of the corporate network is considered. Using a practical example, countermeasure technology is developed and it is shown how spam can affect the network and how you can protect yourself from spam attacks using DMARC technology.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have