{"title":"基于DMARC的垃圾邮件防护技术","authors":"O. O. Rode","doi":"10.31673/2409-7292.2022.033238","DOIUrl":null,"url":null,"abstract":"The article explores the issues of protecting information and communication systems and e-mail from unwanted spam or spam attacks. Theoretical information about spam and its types is provided. The main technologies and methods of protecting communication systems from spam and spam attacks are formulated. The influence of spam on the activity and work of the corporate network is considered. Using a practical example, countermeasure technology is developed and it is shown how spam can affect the network and how you can protect yourself from spam attacks using DMARC technology.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Email spam protection technology based on DMARC\",\"authors\":\"O. O. Rode\",\"doi\":\"10.31673/2409-7292.2022.033238\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article explores the issues of protecting information and communication systems and e-mail from unwanted spam or spam attacks. Theoretical information about spam and its types is provided. The main technologies and methods of protecting communication systems from spam and spam attacks are formulated. The influence of spam on the activity and work of the corporate network is considered. Using a practical example, countermeasure technology is developed and it is shown how spam can affect the network and how you can protect yourself from spam attacks using DMARC technology.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.033238\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.033238","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The article explores the issues of protecting information and communication systems and e-mail from unwanted spam or spam attacks. Theoretical information about spam and its types is provided. The main technologies and methods of protecting communication systems from spam and spam attacks are formulated. The influence of spam on the activity and work of the corporate network is considered. Using a practical example, countermeasure technology is developed and it is shown how spam can affect the network and how you can protect yourself from spam attacks using DMARC technology.