What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via email, text message, online chat, blogs or various other.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Basic Communication on the Internet:
BlueRedGreenPurpleOrange.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Surrey Public Library Electronic Classrooms Essentials.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Dealing With Spam The kind, not the Food product.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
August 15 click! 1 Basics Kitsap Regional Library.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Hearth Bulk System Divisional Secretaries’ Briefing 2012.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
AND SPAM BY OLUWATOBI BAKARE
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
Staying Safe Online Keep your Information Secure.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Unit 10 Communication Services
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Protecting Students on the School Computer Network Enfield High School.
Key Terms. Online Communication Online community A virtual community which exists only online. It may be open to anyone (eg. a bulletin board) or restricted.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
etiquette. 1. language Use the right language because the will have to keep correcting your mistake and it will like better if you don’t misspell.
Don’t send offensive pictures  This can badly offend people in many ways or they could take you to court and may get charged. Also it is illegal to send.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing tactics.
Understand Malware LESSON Security Fundamentals.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Windows Vista Configuration MCTS : Productivity Applications.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Unit 3 Section 6.4: Internet Security
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
Unit 11 Communication & Collaboration
Phishing is a form of social engineering that attempts to steal sensitive information.
Unit 4 IT Security.
Demo Advanced Threat Protection
What is it? Why do I keep getting from Barracuda? SPAM.
Computer Security.
Bell Ringer How can you protect your self online?
Cybersecurity Simplified: Phishing
Presentation transcript:

What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other online formats.  Most Spam is created to promote questionable websites or illegal/unregulated/counterfeit products.

Spam  Also known as junk or unsolicited bulk (UBE), when an unsolicited message is sent to numerous recipients at once. Bulk and unsolicited are the most synonymous characteristics.  Many times you may be prompted to click on a link that directs you to a phishing website or site with malware.  Sometimes malware is already included in the Spam via file attachments.

What Does Spam Look Like?  Spam can look a variety of ways, but there are some typical subject lines that are giveaways…  “Here is what you asked for…”  “Congratulations! You have been chosen for…”  “Lose weight, reduce ageing…”  Spam usually looks general and like a potential advertisement.  Often Spam will project itself as something important or familiar:  Facebooks  Office of Dr. Steven Negrete

Impacts of Spam  The main concern with Spam is the potential presence of malware that can seriously compromise a network.  Spam also over-work servers, limits disk space and slow bandwidth, which limits the productivity of network users.  Spam also limits the success of legitimate companies who use for marketing. Essentially, Spam give advertising a “bad reputation.”

How Do Spammers Find You?  A majority of Spammers rely on software programs called Spam Bots to scan through countless websites looking for any address they can find.  Others simply send Spam using a combination of names and providers. (ex. There is very little for the Spammer to lose when resorting to this method.

Protecting Against Spam  Most providers use Spam filters to reduce the amount of Spam received. In many cases, this can be enhanced by the user by adding certain senders or phrases to a Spam or Block list.  There are specific programs available to additionally combat Spam, such as SpamAssassin.  There are several watchdog organizations that are also actively working to reduce Spam by compiling databases of IP addresses or domain names that are associated with Spam.

How Spammers Avoid Filters  Spammers have a number of techniques that they use to get around filters. Often Spam will have paragraphs of text to make it hard for programs to identify the as Spam.  One of the most common techniques is Image Spam. The Spammer will send text in an image format rather than text. Filters generally cannot read images, so it is easy for the to get through the filter.