Estrategias técnicas contra el correo basura |
|
En esta Recomendación UIT-T X.1231 se insiste en las estrategias técnicas para la lucha contra el correo basura (spam) y se incluyen las características generales del spam, así como los principales objetivos de la lucha contra el mismo. Además, asumiendo que no hay una única solución válida para resolver el problema del spam, esta Recomendación también ofrece una lista de verificación para evaluar las posibles herramientas de lucha contra el correo basura. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9333 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1230-X.1249: Countering spam |
Approval date: |
2008-04-18 |
Provisional name: | X.csreq |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1231 (04/2008)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 25 (03/2016)
|
ITU-T X.1231 - Supplement on guidance to assist in countering spam for mobile phone developers
|
In force
|
here
|
here
|
here
|
X Suppl. 33 (09/2018)
|
ITU-T X.1231 - Supplement on technical framework for countering telephone service scams
|
In force
|
here
|
here
|
here
|
X Suppl. 37 (09/2022)
|
ITU-T X.1231 – Supplement on countering spam based on machine learning
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|