Clean Out the Junk! Outsmarting Unsolicited E-mail NUIT Tech Talk Presentation February 18, 2005 Sherry Minton Dan Frommer.

Slides:



Advertisements
Similar presentations
Microsoft ® Office Outlook ® 2003 Training Outlook can help protect you from junk Upstate Technology Services presents:
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
How to Use Stowe School District
1 Effective, secure and reliable hosted security and continuity solution.
Basic Communication on the Internet:
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Microsoft ® Office Outlook ® 2003 Virtually Working for You presents:
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
The Times Are Changing What’s New & Changing with Technology at Northwestern NUIT Tech Talk – May 13, 2005.
Defense System (EDS). The problem today 15,000,000 virus-infected messages and millions of junk messages go across the NU Network.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
This is the first page of the log in, this is were you enter your unique details.
Quiz Review.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
AND SPAM BY OLUWATOBI BAKARE
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Prepared by: Ms Melinda Chung Chapter 3: Basic Communication on the Internet: .
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
etiquette Etiquette s always go to any of the following: Staff
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
Chapter 3 Social Media Revolution Video. 1. Guidelines a. Determine the information you need. b. Consider who is likely to have the info. c. Communicate.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
GroupWise 6.5 Junk Mail Handling July 28, Configuring Junk Mail Handling Junk Mail Handling enables you to have actions taken automatically on any.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Features Help (Adding Attachments) (Adding Auto Signatures) (Setting Priorities)
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Lightspeed is a web-blocking and filtering software program providing safe online security for educational users.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Security fundamentals Topic 9 Securing internet messaging.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
OWA Training Outlook Web Access Basics: , Calendars, and Contacts.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
OWA Basic Training. Topics Mail Logging into OWA Navigating mailbox: Reading messages New messages New mail folders Reply/Forward/Print/Delete Mark, Flag,
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
Yahoo! Mail We gave Google some good press so we’ll use Yahoo! mail as our example for web s. If you don’t have an account Yahoo! will provide.
What are the steps to stop spam s on Yahoo?
Technology ICT Option: .
What is it? Why do I keep getting from Barracuda? SPAM.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Technology ICT Option: .
Presentation transcript:

Clean Out the Junk! Outsmarting Unsolicited NUIT Tech Talk Presentation February 18, 2005 Sherry Minton Dan Frommer

Agenda Junk What and why? Blocking junk at the server level: Northwestern’s new Defense System Blocking junk locally using Outlook, Apple Mail, and Eudora Preventing junk

Junk What do we mean? Unsolicited advertisements Commonly called “spam” Sent in mass mailings

Junk What do we mean? Usually in the form of advertisements Often inappropriate for work setting May also include malicious attachments, such as viruses, trojans, worms, and/or spyware

The Prevalence of Junk Approximately 80% of transmitted is considered “junk” Of 169 million “online adults” in the United States, 78% receive junk on a daily basis Nearly half of those receive more than 10 junk s per day

One person’s trash… Americans spent a total of 1.2 billion hours deleting junk in 2004 That equates to approximately $22 billion in lost productivity Does not include the toll on infrastructure and the cost of junk filtering software

…another person’s treasure 14% of American adults open their junk to see what it is; a solid ratio for sales “leads” 4% (about 5 million people) made purchases from junk ads in ‘04

Clean Out the Junk Get Control of Junk Server-Side Junk Filtering Northwestern’s “ Defense System”

Defense System Overview New technology coming soon to Northwestern’s servers Scans for junk before reaching your computer Reduces junk that reaches your Inbox Deletes viruses before reaching your computer

Defense System Overview Why implement a University-wide junk filter? 2004: 15 million junk s at NU Increasing popularity of Web mail, which has no built-in filtering Increasing threat of transmitted viruses, which can paralyze even the strongest networks

Defense System Concerns before evaluation Legality/Ethics: Ensure that server- level filtering does not violate academic freedom Effectiveness: Both in terms of performance and value Universality: Applicable for all users, including handheld/PDA & Webmail

Defense System How it works Scans messages “on their way in” for viruses; if present, messages are deleted Assigns each message a “junk score” Depending on settings, quarantines s marked as junk in special Web-accessible mailbox

Defense System How it works (continued) Users receive daily listing quarantined messages marked as highly probable junk Users can log in to a Web site with NU NetID/password and select marked messages, if any, to deliver to regular Inbox

Defense System How it works (continued) Users can set personal choices, such as blocking or accepting all from a certain sender or domain Messages from northwestern.edu are never considered to be junk unless the “from” address is spoofed

Defense System What to expect Later this spring, the entire University will be moved over to the Defense System Users may opt out at any time System effective and easy to use: 93% of testers believed it would benefit the Northwestern community

Clean Out the Junk Get Control of Junk Client-Side Junk Filtering

What is it? Your software (Outlook, Apple Mail, Eudora) scans incoming mail, applies pre-set “rules,” and filters junk from legitimate .

Client-Side Junk Filtering How does it work? Red flags include: –Suspicious sender addresses: –Baad speelllinge, lot s of s p ac es, ALL CAPS FOR MILES –Excessive! Use!! Of! Exclamations!!! –Your name in the subject line: Hi Daniel, need a new mortgage?

Client-Side Junk Filtering Why use it? Saves time, cuts clutter; less annoying than deleting manually Won’t load junk images that advertisers use to track your participation Can help prevent spread of viruses, infections attached to junk s

Client-Side Junk Filtering Common features: Separate mailbox for junk Automatic filtering and/or labeling Customizable lists to “always allow” or “always block” domains or people –Always allow: –Always block:

Junk Filtering: Outlook Mailboxes Options

Junk Filtering: Outlook Safe Senders Add a safe sender Helpful automation features: Trust from Contacts Add outgoing addresses to safe senders list

Junk Filtering: Apple Mail Safe Senders Filtering Mode

Junk Filtering: Apple Mail Actions Conditions Advanced Settings Screen

Junk Filtering: Eudora Actions Junk Threshold Junk Mail Options

Clean Out the Junk Get Control of Junk Techniques for Preventing Junk

Preventing Junk If you don’t know who an is from, don’t even open it: just loading the images can tip off advertisers and increase junk sent to your account Use a second address (such as Yahoo or Hotmail) for online shopping, filling out Web forms, and non-NU lists

Preventing Junk Don’t click “Remove” on junk messages unless you trust the sender; it shows advertisers that you read their junk messages Avoid publicizing your NU address on the Web If necessary to post on the Web, hide your address using an image or script

Resources Get Control, NUIT’s Web Site for computer security: More information about NU’s new Defense System Instructions for setting up junk e- mail filters in popular clients Tips for preventing junk

Questions? Next Tech Talk: Stay Connected – Your Internet Connection Off-Campus Friday, March 11, 2005, Noon – 1 p.m. Same locations – Evanston & Chicago Please register Thank you for attending!