Answer should be original, and similarity (plagiarism) not more than 10% this is very very very important otherwise I will be in trouble. Answer should be a clear explanation and should be clear...

1 answer below »


Answer should be original, and similarity (plagiarism) not more than 10% this is very very very important otherwise I will be in trouble.



Answer should be a clear explanation and should be clear understand (1000 words enough).



Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books.



When use citation from any reference please keep it between "citation" (Author,Year),please citation should be not more than 5%



As reference you can use the following book:



Casey, E., (2011)
Digital evidence and computer crime: forensic science, computers and the internet. 3rd ed. New York: Elsevier Academic Press.



Assignment is:


This project is to analyze the header files of spams. The file199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.). You may use more recent spams collected there (if it is available). What you are required to do for this week is to analyze at least 10 spam emails there and answer the following questions:


1. whatare the common characteristics of these spam emails?
2.have the spammers tried to hide their identity?
3. wheredo the spams come from?
4. if the spam is a phishing email, can you trace back to the criminal's identity?
5. do you know what email clients the spammers use to generate their spams?
6.what other forensic information have you identified there?



Answered Same DayDec 21, 2021

Answer To: Answer should be original, and similarity (plagiarism) not more than 10% this is very very very...

David answered on Dec 21 2021
125 Votes
Email spam, additionally called unsolicited bulk Email (UBE), junk mail, or unsought business
email (UCE), is that the follow of causation unwelcome email messages, oftentimes with business
content, in massi
ve amounts to associate degree undiscriminating set of receivers. Spam in email
began to develop a haul once the web was unfolded to the final public within the mid-1990s. It
rose exponentially in the subsequent years, and nowadays comprises some eighty to eighty fifth
of all the e-mail within the world, by a "conservative estimate". Force to create email spam
contraband has remained winning in some authorities, however less thus in others. Spammers
benefit of this truth, and regularly source components of their processes to countries wherever
spamming won't get them in lawful hassle.
Progressively, email spam nowadays is shipped via "zombie networks", nets of worm- or virus -
infected PC in households and workplaces round the globe. Several trendy worms install a
entrance that permits the transmitter to admission the pc and usage it for malicious functions.
This make difficulties to regulate the unfold of spam, as in several cases the spam does not clearly
create from the transmitter. In Nov 2008 associate degree ISP, McColo that was as long as facility
to botnet operatives was concentrated and spam born 50%-75%. At a similar time, it's changing
into pure that malware writers, spammers, and phishers square measure knowledge from one
another, and probably founding varied styles of corporations.
A trade of email address gathering is devoted to aggregation email addresses and commerce
accumulated databanks. A number of these address gathering methods trust customers not
interpretation the well print of contracts, leading to them approving to send mails
comprehensively to their associates. This can be a standard method in community spam like that
produced by the social networking website Quechup.
1. The common characteristics of this Email Spam are
 Contains the Html tags which are often use to avoid filtration
 Common use of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here