Main Menu

Our Partners


Authorized Pearson Vue Test Center



TESDA
Live Online Training


Live CCNA Remote lab

Contest

  

CNCTC Articles - Excellence in IT TRAINING

Why are e-mails susceptible?

by: Melissa Reyes | 16 Jun, 2010 09:54:50

Article Word Count: | Viewed: times


Recently, the independent testing laboratory AV-test.org is too harried to program virus signatures to completely stop computer viruses. Likewise, the network administrators are troubled and hurriedly apply virus signature every time they find some symptoms that their computers are being attacked. With all their efforts, their discovery comes to realization however; it requires alot of hours or days before these vendors of anti viruses software  to develop this cure. As a matter of fact, the industries leadears in anti virus development such as McAfee, Symantec, Sophos, and Trend Micro can distribute at least in the span of 12 hours. In this event, the virus spreads more quickly than the distribution. Hence these viruses damage a lot before such remedy is done.

When the virus MyDoom had done tremendous damage and impeded the smooth flow of corporate resources in early 2004, e-mails networks had been the gateway to spreading quickly. It infected at least five emails via internet. This known worm had been recorded much faster to spread virus than other malware just like the Sobig.F virus. Even though, anti-virus actively existed, it affected vulnerable networks due to delays or lags. This means that damage had begun before the virus was defined.

Consequently, troubled corporate officers and organizations have deployed a signature based remedy but it seemed tragic because this doesn’t work effectively. It requires much more effort to delete and eliminate viruses to the extent that network administrators had been using up-to-date antivirus software however it cost. Nevertheless, it caused the network systems brought down affecting others.

In most times, in lieu of telephone marketing, e-mails prevail in various organizations, to be the fastest and easiest tools in corporate world but it has been the most susceptible to viruses. It further spreads and ruins the whole network.

Through the hard work of intrusion detection systems (IDS) and virus scanners, they obligated to delete and eliminate and to block attacks against this annoying malware.  First, Scanners scan and detect malicious software and lock down ports. This aims to protect the enterprise free from virus from other unauthorized access while firewalls presents preventive programs. However, e-mails are sometimes unguarded by the firewalls because these are inter-facing applications. However, this can be functioned by the use of Simple Mail Transfer Protocol or SMTP and Post Office Protocol or POP. Furthermore, the port 25 that runs through firewall, either transmits or disallows e-mails to pass through email server but the disadvantage is that this firewall couldn’t distinguish whether the e-mail is good or just spam or a virus or much worse.


Protected by Copyscape Originality Checker





Other Related Topics..
« Prev item - Next Item »
---------------------------------------------


What do you think?

Leave comment

This item is closed, it's not possible to add new comments to it or to vote on it

Comments

No comments yet. You can be the first!

  
CNCTC Live Chat Inquiry

Job Openings

Subscribe

Stay Informed Subscribe

Name *

Email *