Discussion:
Managing UCE/Spam
One of the oldest vectors of attack for malicious software is through email. What are some methods you have seen that are used to prevent the distribution of malicious software? Evaluate the effectiveness or ineffectiveness of the methods you have identified in preventing the spreading of malicious software. In your response post, comment on those your classmates have identified.