Dealing with Spam A CyberAngels Tutorial. Contents Introduction - What is spam? Conclusion Quick Quiz.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Basic Communication on the Internet:
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
Internet etiquette, or netiquette guides us in proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
How to write an . Things to consider Write from your university account Avoid using s which do include neither your name or surname eg.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
What is identity theft, and how can you protect yourself from it?
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
August 15 click! 1 Basics Kitsap Regional Library.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
This PowerPoint presentation will show you how to use your productively and successfully.
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
User Guide Joseph Harris. Open To open an you need to double click on it and the selected should open.
Tool Kit. Receiving an When you receive an , it will appear on the white box, which is the conversation list. To do this you will have.
Security Issues: Phishing, Pharming, and Spam
Name: alex lewis Form:.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes (what.
Over 3,000 computers are affected monthly by Malware and Phishing.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Information guide.
. Open a Click on your inbox and click on a you want to open then it will open.
NETIQUETTE. WHAT IS IT??? Netiquette refers to the rules of online etiquette that guide users while working, communicating, and utilizing resources in.
Scams & Schemes Common Sense Media.
The Internet contains an infinite number of high- quality, interesting, intriguing, and well-designed sites, and surfing on the Web is usually a source.
By Ciaran carney. ADD COM  Etiquette – Acceptable Use Policy  Use a suitable subject in the - this helps the reader to understand what the message.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By Sasha Radjuk. - Etiquette and User Guide Give some basic notes on how to log in. To login go on Google and type in outlook web app and the type.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Etiquette. Sending s 1. Make sure your includes a courteous greeting and closing. Helps to make your not seem demanding or terse.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Create a new then select the options tab. Setting high/low importance.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
OCR Nationals Unit 1 – ICT Skills for Business. Using in business What bad practice can you see in this ? Annotate your copy.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Santa’s s By Alexander Britton. Sending an .
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
ETIQUETTES “ - when it absolutely positively has to get lost at the speed of light.”
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Memos, Netiquette, .  A memo is short for memorandum, which is a written reminder of something important that has occurred or will occur.  Memos.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Unit 11 Communication & Collaboration
Huntington Beach Public Library
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Presentation transcript:

Dealing with Spam A CyberAngels Tutorial

Contents Introduction - What is spam? Conclusion Quick Quiz

Learning outcomes What is spam? How to spot it How to avoid being spammed Dealing with spam Where to go for more help

Introduction What is spam? –Unsolicited (you didnt ask for it) –Unwanted (it is not welcome) –Repeated (you normally get lots of it) –Often from unknown senders –May be offensive or embarrassing –May be a front for crimes like phishing

For instance A lot of spam focuses around relatively few topics: –Pornography/sexual content –Pharmaceutical products –Offers around making money quickly or generous business deals –Repeated requests from financial institutions for details that verify or update records apparently held (these are often phishing scams) –Supporting a campaign, e.g. a lost child, a sick partner, etc.

Spotting spam You can often spot spam either by it being very formulaic and/or full of spelling mistakes (often with punctuation characters mid-word) A lot of spam (but not all) comes from addresses that dont look like real internet addresses - e.g. a random mix of characters Some viruses make use of address books - so if you start receiving out of the ordinary or unexpected s from someone you do know, this may be the reason

Avoiding spam Be very careful about who you give your address out to - both to individuals and to organizations Look out for privacy/data protection statements offered by organizations Get a spam-blocker, set it up and activate it to pre-empt incoming spam Consider using a disposable address

Dealing with spam Report it - to ISPs, appropriate sites (e.g. those that the spam claims to be from), etc. Get a spam blocker and set it up properly Delete and ignore it For particularly bad cases: –set up a new address and notify only people you want –Over time, move away from your original

Quiz 1. Spam is that is: a. Uninvited b. Unwanted c. Repeated d. All of the above

Answer to Question 1 The correct answer is d

Quiz 2. If you receive spam you should: a.Delete it b. Reply to it using your service reply button c.See if you can identify an unsubscribe or similar link and use that to try to cancel future mailings d. Follow any forwarding instructions or information requests in the message

Answer to question 2 The correct answer is a

Quiz 3. What is the best way to manage spam? a.Set up an signature saying you dont want spam b.Only share your address to organizations with robust privacy policies c.Setting up a black list which includes prohibiting all inbound d.Replying to individual spam messages with polite but firm requests to stop mailing

Answer to question 3 The correct answer is b