Week 6 Network Security - How would you implement a successful

Week 6 Network Security
Discussion
Case study
Prepare a two page paper on the following:
How would you implement a successful spam-filtering policy. You may use the internet for more information. Please double space your papers and cite your sources.
Key words
Select ten key terms from chapter 16 and ten key terms from chapter 17 and type the definitions of each.
Chapter 16
· AOL Instant Messenger (AIM)
· Botnet
· DomainKeys Identified Mail (DKIM)
· E-mail hoax
· Encryption
· Instant messaging (IM)
· Mail delivery agent (MDA)
· Mail relaying
· Mail transfer agent (MTA)
Chapter 17
· JavaScript
· Lightweight Directory Access Protocol (LDAP)
· PHP
· Plug-in
· Secure Sockets Layer (SSL)
· Server-side scripting
· SSL stripping attack
· Transport Layer Security (TLS)
· Uniform Resource Locator (URL)
· X.500

-
Rating:
5/
Solution: Week 6 Network Security - How would you implement a successful