CCT206H5 Lecture Notes - Lecture 11: List Of Material Published By Wikileaks, Indictable Offence, Denial-Of-Service Attack

174 views2 pages

Document Summary

Cct208h5 - law, technology and culture (winter 2018) High proportion of total volume of email. Physical mail, text messages, phone calls, fax communications, ads. Control the assault of non-solicited pornography and market act 2003. Bans harvesting (data harvesting, web scraping, scripting or malicious bot/fishing) You can send mass messages under the following conditions: Category 1: compliant with the can-span act of 2003. Refers to as cem (commercial electronic messages) Consent - get the consent of the receiver. Identification - provide accurate information about your personal info. Always easier to regular commercial speech rather than non-commercial. An attempt to make a machine or network resource unavailable to its intended users. Consumption - consuming massive amount of traffic into a website. Disruption - shut down your ability to find domain websites. Email bomb - consumption attack/flooding an inbox. Related attack: ddos to obtain university lecture cameras to feed them somewhere. Email spoofing - making an email identity to mask an undisclosed email.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents