There are two approaches to email authentication: 1) IP-based approach used by Sender ID 2) signature based approaches being developed by Yahoo and CISCO.
35 organizations have requested FTC to adopt SenderID technologies to prevent spam mails, phishing attacks and email spoofing.
Trusted Human Computer Interactions-- what does that mean?
Today humans use computers for online interactions, for online communications using email, for social networking using social networking sites such as facebook or myspace, for virtual social interactions using the virtual world of cyberspace, and for various other purposes. Banking and commercial transactions also take place over the net. Humans also use computers for education and knowledge and for using search engines for information and knowledge on any topic under the sun. The world wide web is a tangled web, where criminals and criminal groups operate freely. Viruses, worms and trojans are out there on the lurch, and phishing attacks and spam mails can lead to identity theft and fraud. It is easy for a person to fall prey to online deception.
This leads us to the questions: Can we interact in cyberspace with trust? How do we ensure 'trusted' human interactions, particularly online interactions, with the exploding use of the web? How do we protect privacy on the web? Online safety thus becomes an important component of online computer interactions and usability. Usable privacy and security has become an important area of research in HCI (Human Computer Interaction) with important work being done at Carnegie Mellon University, MIT, Stanford, Harvard etc.
This blog is an attempt to deal with many of these issues surrounding trust, privacy, and security aspects of use of the web and on securing online human computer interactions for leisure or for profit.
Greatest Hits
-
Listen to songs and download Mp3 for free, as well as the explanation of
the song with details from size, duration, artist, album and more download
songs...
"The Road Not Taken" by Robert Frost sums up my life:
From white collar crime investigation to IT, teaching, IT consulting, information security and now research......still exploring what life is all about. Continuous learning is a part of my life. Remembering Henry Wadsworth's lines: 'Let us, then, be up and doing, with a heart for any fate; still achieving, still pursuing, learn to labor and to wait.'
There are two approaches to email authentication: 1) IP-based approach used by Sender ID 2) signature based approaches being developed by Yahoo and CISCO.
ReplyDelete35 organizations have requested FTC to adopt SenderID technologies to prevent spam mails, phishing attacks and email spoofing.
Please see:
http://www.truste.org/about/sender_id_industry_letter.php
-jp