By: Jack P Mchugh Presented by: Kiel Brown. Spam Unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals,

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

IS SPAM ETHICAL? ETHICAL REFECTIONS ON THE PROBLEM OF SPAM... Sudharsan Chandrashekaran.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Basic Communication on the Internet:
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Surrey Public Library Electronic Classrooms Essentials.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
“We Can Stop the Spam!” Article written by Jack McHugh Presented by Sebastian Fischer.
May 15, 2014 Time-Delayed and Date-Certain Delivery Mail Michael Ravnitzky.
Introduction to Your Name Goes Here
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
- Part 2 Your teachers are :. Review 1.Did you do your homework? Was it difficult, easy, or just right? 2.Turn to your partner and tell them your.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
AND SPAM BY OLUWATOBI BAKARE
“We Can Stop Spam” Author: Jack P. McHugh Pui Ying (Ivy) Cheung.
“WE Can Stop the Spam!” By: Jack McHugh. Proposals to identify spam  Michigan- require commercial ers to insert “ADV” as the first three characters.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Netiquette. APK Mrs. Batichon sent a thank you , but forgot to change the name of the receiver. Embarrassing. Sent a text or letter to the wrong.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Unit 9 Communication Services
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
The Internet contains an infinite number of high- quality, interesting, intriguing, and well-designed sites, and surfing on the Web is usually a source.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Unit 10 Communication Services
SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward.
9/4/01Mary Price ( )1 ELECTRONIC MAIL. 9/4/01Mary Price ( )2 Electronic Mail ( ) A facility which allows text messages and computer files.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
1. Connecting with the Modern Consumer 16. Pre-Media: 1900 – 1950 Scale: One to one Reach: Direct Local Tools: Yard signs Outdoor ads Direct mail 17.
GroupWise 6.5 Junk Mail Handling July 28, Configuring Junk Mail Handling Junk Mail Handling enables you to have actions taken automatically on any.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!
Listservs & Discussion Forums ICT Applications in School Libraries.
1. Connecting with the Modern Consumer 15. Pre-Media: 1900 – 1950 Scale: One to one Reach: Direct Local Tools: Yard signs Outdoor ads Direct mail 16.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
SPAM: A PROBLEM IN NEED OF FEDERAL LEVEL REGULATION Linda Nagel Cyberlaw Fall 2002 November 4, 2002.
Trespass in the Spam Cases. CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Computer Literacy 1 Transition Plus Services.
Sender Reputation in a Large Webmail Service by Bradley Taylor (2006) Presented by : Manoj Kumar & Harsha Vardhana.
Internet Safety.  Ethics-moral standards or values  Netiquette-rules for proper online behavior.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Unit 4 IT Security.
Sports and Entertainment Marketing 1
Using Apps to Get and Share Information
Introduction to Your Name Goes Here
Who is responsible for your marketing? May 2013
Introduction to Justin R. Scott CIS Introduction to .
How to Automatically Delete Spam Mails on Mac PC?.
Information Security Session October 24, 2005
Introduction to From the Saint Paul Public Library.
ethical issues in business
Introduction to Your Name Goes Here
Security of People, Property and Information
Presented by: Sehar Munawar Registration no: B2F17ASOC0035 Presented to: Sir Waseem Iqbal & management & spam.
Presentation transcript:

By: Jack P Mchugh Presented by: Kiel Brown

Spam Unsolicited , often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e- mail.(dictionary.com)

Crimes of Spam Threatens usefulness of Threatens usefulness of Spam is being sent at a exponential rate; as much as 50% per month Spam is being sent at a exponential rate; as much as 50% per month It has been reported that spam causes a loss of $10 billion a year in lost productivity It has been reported that spam causes a loss of $10 billion a year in lost productivity It may be costing businesses as much as $.70 to delete each piece of junk mail It may be costing businesses as much as $.70 to delete each piece of junk mail Often disguised as important information Filtering programs ineffective Often disguised as important information Filtering programs ineffective

What is Being Done The Michigan House of Representatives is considering legislation that will require Spam senders to mark the by heading it “ADV”. The Michigan House of Representatives is considering legislation that will require Spam senders to mark the by heading it “ADV”. The Federal trade commission is preparing to implement a national “do not spam” list. The Federal trade commission is preparing to implement a national “do not spam” list. People who do not adhere and send mail anyway would be fined. People who do not adhere and send mail anyway would be fined.

The Problem with Intervention The internet can not be controlled The internet can not be controlled Sending s from overseas accounts is the easiest evasive action. Sending s from overseas accounts is the easiest evasive action. Expensive to monitor, to prosecute and to impose fines. Expensive to monitor, to prosecute and to impose fines. Government Control: If it controls , what’s next…. Government Control: If it controls , what’s next….

Another Approach To control it ourselves To control it ourselves By not opening a spam message unless it begins with the letters “ADV” By not opening a spam message unless it begins with the letters “ADV”

How do We Let People Know Use the same tools as our adversaries Use the same tools as our adversaries Mass s, and continuous forwarding of the message. Mass s, and continuous forwarding of the message.

Conclusion Spam is a expensive nescience Spam is a expensive nescience It cost billions of dollars in productivity yearly It cost billions of dollars in productivity yearly We can not rely on the government to change the problem We can not rely on the government to change the problem The solution is a grassroots network to fight the effectiveness of this menace The solution is a grassroots network to fight the effectiveness of this menace