E-Business Technologies BCM SPAM Rafael Quiroz Vázquez Professor Eduard Heindl.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Breaking Trust On The Internet
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Computer Assisted Communication. Terms Asynchronous Blog Bulletin Board – Discussion Board Chat Chat Room.
SPAM Ka Yat, Kei Comp 450 Spring 2008, CSUN. Thesis Statement Thesis Statement---Spam is becoming a bigger issue in the computer world. How do we.
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
AND SPAM BY OLUWATOBI BAKARE
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Social impacts of the use of it By: Mohamed Abdalla.
Protecting Yourself Online (Information Assurance)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Safe Internet Use Mark Wheatley CSI Onsite
1 1 © Oxford University Press, All rights reserved. 11 E-Commerce & E-Business.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward.
Presented by: Your Name Your Phone Number Your Website Address How a Mobile Website Can Help You Connect With Local Consumers.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
1 Tracking an Offender. 2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS.
Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
 Pretty much any kind of file can be sent on such as a photo or even a virus. .exe files are usually always viruses. (never open these even if.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
A library is primarily set up to acquire, organized, store and make accessible to the users, within the quickest possible time all forms of information.
What is Spam? d min.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
Spam s By Jessica Romero CS-301. Spam s Spam s? Spam s? Is unsolicited and promotional sent to in bulk to multiple users.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Who wants to be a Millionaire? Focus: The Internet.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
A Student’s Guide to Proper and Safe Web Behavior
Top 5 Open Source Firewall Software for Linux User
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Unit 4 IT Security.
Innovative Business Solutions
Fad diets are neither SAFE nor RELIABLE ways to lose weight!
Information Security Session October 24, 2005
What is it? Why do I keep getting from Barracuda? SPAM.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
What is Phishing? Pronounced “Fishing”
Presentation transcript:

E-Business Technologies BCM SPAM Rafael Quiroz Vázquez Professor Eduard Heindl

Agenda Rafael Quiroz Vázquez Definition History How does spam work? Categories Laws Where is spam? Battle against spam Spam every day

Rafael Quiroz Vázquez Spam is the abuse of sending unauthorized and inappropriate bulk messages It is sent to a lot of people It is normally advertisement or promotional It is not requested by the addresser. Definition

History Rafael Quiroz Vázquez The name comes from USA (30’s). It was the name of a can which contains meat. British Band popularized the term spam. The spam became popular in the 90’s. Nowadays, spam continues increasing.

How does spam work Rafael Quiroz Vázquez Spammers need the addresses There are several ways to get the addresses They have tools that allow them create virus and control the computers of the web-users. They are hired by big companies to make advertisements of their products

Phising and scam Rafael Quiroz Vázquez Phising is type of deception designed to steal your valuable personal data: 1.- Fake web site that accepts donations for charity. 2.- Social network site of the web-user 3.- Fake message of the co-workers or web- user. These kind of spam comes from fake reliable web- sites for the web-user, they are called scam.

Categories Rafael Quiroz Vázquez

Categories Rafael Quiroz Vázquez Example Subject: Lose up to 19% weight. A new weightloss is here. Hello, I have a special offer for you... WANT TO LOSE WEIGHT? The most powerful weightloss is now available without prescription. All natural Adipren % Money Back Guarantée! - Lose up to 19% Total Body Weight. - Up to 300% more Weight Loss while dieting. - Loss of 20-35% abdominal Fat. - Reduction of 40-70% overall Fat under skin. - Increase metabolic rate by 76.9% without Exercise. - Burns calorized fat. - Suppresses appetite for sugar. - Boost your Confidence level and Self Esteem. Get the facts about all-natural Adipren720: {LINK}

Laws Rafael Quiroz Vázquez Governments should organize and decide which is the best way to control the flow of the iformation through the net. Every government stablish its own rules, the problem is that once a spam is created in any part of the world it can be trasmited to any computer in another country. Therefore the governments should make an agreement to improvise the performance against the spam.

Laws Rafael Quiroz Vázquez

Where is spam? Rafael Quiroz Vázquez Forums Blog Social networks Mobile Internet Relay Chat

Battle against spam Rafael Quiroz Vázquez Four groups: End-user technique Automated techniques for administrator Filtering techniques Automated techniques for senders

Spam every day Rafael Quiroz Vázquez

Reference Spam data (2009). Retrieved June 29, 2009 from Spam data (2009). Retrieved June 29, 2009 from Peraldo Lorenzo, (2008). Anti-spam techniques Retrieved June 25, 2009 from “Obligaciones de información sobre la seguridad”. (2008) Retrieved June 21, 2009 from Harris David. (2003). Spam, the curse of the new millennium: an overview and white paper. The state of spam (n. d.) Retrieved June 28, 2009 from The definition of spam (n.d.). Retrieved June 12, 2009 from How does spam work (n. d.) Retrieved June 13, 2009 from FC4252D98CB/104/284/220/ART/ “Tipos de spam” (2009) Retrieved June 28, 2009 from Recognize phishing scams and fraudulent (n. d.) Retrieved June 14, 2009 from Recognize phishing scams and fraudulent (n. d.) Retrieved June 14, 2009 from

Thank you