El titulo no se encuentra aún disponible en español. |
|
En la Recomendación UIT-T X.1248 se indican las características del spam por mensajería instantánea (SPIM) y se especifican los requisitos técnicos para contrarrestarlo. A medida que aumenta la popularidad de la mensajería instantánea (IM), la proliferación de SPIM se ha convertido en un problema cada vez más grave. Las características de la IM, por ejemplo que se basa en el protocolo Internet (IP) que se utiliza de manera generalizada y gratuita, hacen que potencialmente el SPIM se propague generalizada e incontroladamente. Si no se resuelven meticulosamente los problemas de SPIM, éste tendrá consecuencias negativas sobre la utilización del servicio IM propiamente dicho. |
|
Citation: |
https://handle.itu.int/11.1002/1000/13262 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1230-X.1249: Countering spam |
Approval date: |
2017-09-06 |
Provisional name: | X.cspim |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1248 (09/2017)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 6 (09/2009)
|
ITU-T X.1240 series – Supplement on countering spam and associated threats
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|