HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 5.54 Protection against mail overload and spam

S 5.54 Protection against mail overload and spam

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator, IT users

A flood of advertisements or intentional overloading via incoming e-mails can not only block mail systems but also give rise to considerable expenses for the recipient. To protect IT systems against "spamming" - or e-mail with irrelevant contents - every user should make careful decisions as to when to disclose one's e-mail address to whom.

The following safeguards can be implemented against advertisement mail and spamming:

It must be noted that not all of these measures are advisable under all circumstances, as each of them impose certain restrictions. On one hand, it might be advisable to refrain from basing e-mail addresses on user names in order to protect one's IT systems against undesired advertisements. On the other hand, abstract e-mail addresses can render communications with external parties difficult, as such addresses are harder to memorise. The form of an e-mail address should always comply with internal organisational rules.

A high volume of e-mail traffic can also result from subscriptions to a correspondingly large number of mailing lists. In general, regular checks should be made as to whether the subjects discussed in a mailing list are still worth reading. If not, subscription should be cancelled. Users must be instructed to make regular (i.e. daily, if possible) checks of mail influx related to subscriptions to mailing lists. In large organisations, mailing lists of professional interest should only be subscribed to by one staff member (e.g. the mail administrator) and then made available centrally to all other employees.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home