Take one disgruntled former employee, add an Internet connection, access to employee email addresses, and a modicum of sophistication in evading mail blocking software and what do you have? Potentially, enough disruptive power to bring a computer network, and thus a business as a whole, to its knees A little determination and negligible cost are all that is needed to unleash a flood of uninvited email upon a single computer or a corporate network. The owner of a system so targeted might then undertake a series of costly self-help measures in an effort to stem the unwelcome tide, including demanding that the sender put a halt to this conduct, adding bandwidth to accommodate the additional load on the network, and committing additional human and software resources in an effort to block the unwanted dispatches.
展开▼