EMAIL AND SPAM ITEC 317 AVA BOLOURI 099165. SPAMS.

Slides:



Advertisements
Similar presentations
Small Business Resource Power Point Series Guide to Promotion Terminology.
Advertisements

The INTERNET.
Basic Communication on the Internet:
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Important Facts you should know about the Net
Advertising for E-Commerce Back to Table of Contents.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
SPAM Ka Yat, Kei Comp 450 Spring 2008, CSUN. Thesis Statement Thesis Statement---Spam is becoming a bigger issue in the computer world. How do we.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
August 15 click! 1 Basics Kitsap Regional Library.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Internet Basics.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Spam Sonia Jahid University of Illinois Fall 2007.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
Company LOGO Exploring Using TWIG (Webmail) at ACC.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
By Julia Mammone, Charlotte Detering & Elizabeth Pham.
Spam / Phishing Björn Bittins Sebastian Kühnau FHTW-Berlin.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
The Internet. What is the Internet?  The Internet is a network of networks.  It gives users access to a wide variety of information from millions of.
World Wide Web and Internet Communications. Definitions O Adware – unwanted advertising banners, pop- ups, pop-unders, etc. in your web browser O Anti-virus.
v=anwy2MPT5RE By Levi Nichols.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Done by: Hanadi Muhsen1 Tutorial 1.  Learn the history of JavaScript  Create a script element  Write text to a Web page with JavaScript  Understand.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Use of Electronic and Internet advertising options Standard 3.4.
Moodle (Course Management Systems). Forums, Chats, and Messaging.
Promotion of e-Commerce sites. A business which uses e- commerce to trade online must also advertise. Several traditional methods can be used, such as.
v=anwy2MPT5RE By Levi Nichols.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
UNIT 12 The Internet By Nahed AlSalah 1 Computer Terminologieg unit12 Nahed AlSalah.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Don’t send offensive pictures  This can badly offend people in many ways or they could take you to court and may get charged. Also it is illegal to send.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
Unit 12 The Internet.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Investigating Methods for Reducing Spam By: Steven Siggers Instructor: Marko Puljic.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Any criminal action perpetrated primarily through the use of a computer.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Learn how to protect yourself against common attacks
Using Apps to Get and Share Information
Use of Electronic and Internet advertising options
EUT 122 Skills and Technology in Communication
Presentation transcript:

AND SPAM ITEC 317 AVA BOLOURI

SPAMS

W HAT IS SPAM ? Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich- quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

W HAT IS SPAM ? There are two main types of spam, and they have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups.Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts.

W HAT IS SPAM ? spam targets individual users with direct mail messages. spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. spams typically cost users money out-of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.

W HY IS IT C ALLED S PAM ? There is some debate about the source of the term, but the generally accepted version is that it comes from the Monty Python song, "Spam spam spam spam, spam spam spam spam, lovely spam, wonderful spam". Like the song, spam is an endless repetition of worthless text. Another school of thought maintains that it comes from the computer group lab at the University of Southern California who gave it the name because it has many of the same characteristics as the lunch meat Spam.

S PAM HISTORY Every Internet user knows the word ‘spam’ and sees it in their inbox quite often. But not everyone knows that years ago the word ‘spam’ had nothing to do with either the Internet or s. ‘Spam’ is an acronym derived from the words ‘spiced’ and ‘ham’. In 1937, the Hormel Foods Corporation (USA) started selling minced sausage made from out-of-date meat. The Americans refused to buy this unappetizing product. To avoid financial losses the owner of the company, Mr. Hormel, launched a massive advertizing campaign which resulted in a contract to provide tinned meat products to the Army and Navy. In 1937, Hormel Foods began to supply its products to American and allied troops. After World War 2, with Britain in the grips of an economic crisis, spam was one of the few meat products that wasn’t rationed and hence was widely available. George Orwell, in his book ‘1984’, described spam as ‘pink meat pieces’, which gave a new meaning to the word ‘spam’ - something disgusting but inevitable. In December 1970 the BBC television comedy series Monty Python’s Flying Circus showed a sketch set in a cafe where nearly every item on the menu included spam - the tinned meat product. As the waiter recited the SPAM-filled menu, a chorus of Viking patrons drowned out all other conversation with a song repeating "SPAM, SPAM, SPAM, SPAM... lovely SPAM, wonderful SPAM", hence "SPAMming" the dialogue. Since then spam has been associated with unwanted, obtrusive, excessive information which suppresses required messages. In 1993 the term ‘spam’ was first introduced with reference to unsolicited or undesired bulk electronic messages. Richard Dephew, administrator of the world-wide distributed Internet discussion system Usenet, wrote a program which mistakenly caused the release of dozens of recursive messages onto the news.admin.policy newsgroup. The recipients immediately found an appropriate name for these obtrusive messages – spam. On April , a husband-and-wife firm of lawyers, Canter & Siegel, posted the first massive spam mailing. The company’s programmer employed Usenet to advertise the services offered by Canter & Siegel, thus giving a start to commercial spam. Today the word ‘spam’ is widely used in terminology, though Hormel tinned meat products are still on sale in the USA.

E MAIL SPAM

spam is any that was not requested by a user but was sent to that user and many others, typically (but not always) with malicious intent. The source and identity of the sender is anonymous and there is no option to cease receiving future s.

E MAIL SPAM spam, also known as junk or unsolicited bulk (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by . Clicking on links in spam may send users to phishing web sites or sites that are hosting malware Spam may also include malware as scripts or other executable file attachments. Definitions of spam usually include the aspects that is unsolicited and sent in bulk.

T HE D EFINITION OF E MAIL S PAM By definition, spam is any that meets the following three criteria: According to Kaspersky Lab, the definition of spam is anonymous, unsolicited bulk . Anonymous : real spam is sent with spoofed or harvested sender addresses to conceal the actual sender. Mass mailing : real spam is sent in enormous quantities. Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost-effective, the initial mails have to be high-volume

T HE D EFINITION OF E MAIL S PAM Unsolicited: mailing lists, newsletters and other advertising materials that end users have opted to receive may resemble spam, but are actually legitimate mail. In other words, the same piece of mail can be classed as both spam and legitimate mail depending on whether or not the user elected to receive it.

Most common products advertised According to information compiled by Commtouch Software Ltd., spam for the first quarter of 2010 can be broken down as follows. Spam by Topic Pharmacy81% Replica5.40% Enhancers2.30% Phishing2.30% Degrees1.30% Casino1% Weight Loss0.40% Other6.30%

W HY D OES A NYBODY A CTUALLY S END S PAM E MAILS ? Chances are that most of us reading this can easily identify a spam message in our inbox and ignore it. However, not everybody is as experienced in the methods of marketing and the risks associated with spam. There are individuals in the world who will respond to spam messages, giving the malicious spammers who sent them exactly the risky financial or personal information that those spammers want. The result can be profit for the spammers and even financial loss for the recipients.

W HY D OES A NYBODY A CTUALLY S END S PAM E MAILS ? keep in mind that one of the great marketing benefits is that the cost in money and time to send spam s is quite low. Whether the spam sender is using his or her own server or renting a low-cost, offshore proxy server, the cost of sending huge numbers of spam s is almost always going to be lower than the return. In most cases, it will only take one individual responding to a spam send to make the entire send worth it to the malicious spammer.

E- MAIL SPAM RELAYED BY COUNTRY IN 2007

H OW DO SPAMMERS HARVEST ADDRESSES ? There are many ways in which spammers can get your address: From posts to UseNet with your address. From mailing lists. From web pages. From various web and paper forms. Using social engineering. From a web browser. From IRC and chat rooms From white & yellow pages. By having access to the same computer.

H OW TO S TOP S PAM

Look for warning signs. Stop posting your address on a public forum or website. Avoid certain sites and software programs. Use spam blocking tools. Report spam. Use disposable addresses to identify and shake off sources of spam. Avoid clicking links within Wiki essays.

D ON ’ T LOOK LIKE A SPAMMER !!!

THANKS FOR LISTENING

DOES ANYBODY HAVE A QUESTION?