Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.

Slides:



Advertisements
Similar presentations
Information and resources
Advertisements

Basic Communication on the Internet:
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Important Facts you should know about the Net
Near North District School Board1 Be Safe, Secure & Private Online.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
ADMINISTRATION Sources of Information REVISION – BLOCK 6.
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
Spam Andy Nguyen 5/17/2004. What is Spam? Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent. Bulk.
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
Fighting Spam Randy Appleton Northern Michigan University
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
Series DATA MANAGEMENT. 1 Why ? Alarm/Status Notification –Remote unattended sites »Pumping stations –Pharmaceutical/Plant maintenance.
August 15 click! 1 Basics Kitsap Regional Library.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
File Upload Instructions and Information The File Upload utility is used for transferring files too large to send through the system. How it Works:
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
Salesforce.com Web to Leads. Unit Name Web to Leads A web to lead provides users the ability to gather information from their website visitors which automatically.
CONCRETE SOFTWARE SOLUTIONS PVT. LTD. A leading Digital Marketing Firm In India.
AND SPAM BY OLUWATOBI BAKARE
Spam and Anti-Spam By Aditi Desai Yousuf Haider. Agenda Introduction Purpose of Spam Types of Spam Spam Techniques Anti spam Why Spam is so Easy Anti.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Review of Last Session Search Engine Optimisation (SEO) Search Engine Optimisation (SEO) You can fine-tune your site so that the search engines notice.
Security Issues: Phishing, Pharming, and Spam
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Lecturer: Ghadah Aldehim
1 Chapter 2 (Continued) Section 2.2 Section 2.2. Internet Service Provider (ISP) ISP - a company that connects you through your communications line to.
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Introduction to Internet
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Unit 10 Communication Services
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward.
Understanding Technology Crime Investigation for Managers.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Promotion of e-Commerce sites. A business which uses e- commerce to trade online must also advertise. Several traditional methods can be used, such as.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Mobile PHONES :-) created by AU MINT SIAN m.6/12.
Yahoo Help Phone Number Get Instant Help.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
©2014 Vantage Unified Communications.™ All rights reserved. Vantage CRM Customer Relationship Marketing.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Learn how to protect yourself against common attacks
Yahoo Support Ireland Toll-Free Number:
Why is it important? ❏ Most website owners do not think that if they paste address on page or post than they have too much risk of spam. ❏
Introduction to Web-Based
AOL Mail Get help to login, sign in & troubleshoot AOL by-get services.com Toll-Free: 1(855)
Presentation transcript:

Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun

Contents  Definiton  The origin of spam  Medium for spamming  Statistics  How to block spam  Discussion

What is “SPAM”?  The use of any electronic communications medium to send unsolicited messages in bulk, indiscriminately

The origin of Spam  Door-to-door salespeople - used the direct approach to solicit response to reach every person in a given geo area  Junk mail (20 th Century) - with the development of the General Post Office, this has become especially true of all mass postings  Telemarketing - used for mass advertising

Spamming in different medium   Instant messenger  News group  Mobile phone  Search engine website  Other new forms..

Spam  Sending identical or nearly identical messages to a large number of recipients.  Frequently contains various tricks to bypass filters.  Many spammers utilize programs called “web spiders” to find addresses on web pages.

Spam

Messaging Spam  A type of spam where the target is instant messaging services such as AOL Instant Messenger or ICQ.  Take advantage of directory service of users, including demographic information such as age and sex.

Newsgroup Spam  A type of spam where the targets are Usenet newsgroups  Usenet convention defines spamming as “excessive multiple posting”, that is, the repeated posting of a message

Mobile Phone Spam  Mobile phone spam is directed at the text messaging service of a mobile phone  This can be especially irritating to consumers not only for the inconvenience but also because they sometimes have to “pay” to receive the text message

Mobile Phone Spam I get this weird SMS sent to me on 10th July 03...U have WON GUARANTEED free holiday inc flight & Accom OR £600 in CASH Call NOW Genuine gift TCs visitww. redm. tv1st...£1.50pm mobvary Valid 12mth.....I mean as if i would even bother wasting my money on phonecalls like this. This is such BOGUS.... if only life was that generous! However that web address lead me to THIS site.... mmmmmmmmm.... and here you are going on about spam text messages.... so who's responsible for my spam text message?!?!?!?!?!

Search Engine Spam  “Spamdexing“- spam targeting search engines  The practice of deliberately and dishonestly modifying HTML pages to increase the chance of them being placed close to the beginning of search engine results, or to influence the category to which the page is assigned in a dishonest manner

Personal Spam Statistics

Blocking spam

Anti-spam Methods  DNSBLs (DNS-based Blackhole Lists) - a site publishes lists of IP addresses via the DNS, in such a way that mail servers can easily be set to reject mail from those addresses  Content-based filtering - an administrator can place some words in the filter configuration. The mail server would thence reject any message containing the phrase.

Anti-spam Methods  Statistical filtering - users mark messages as spam or nonspam and the filtering software learns from these judgements. But it does reflect the user's biases as to content  Checksum-based filtering - it lets ordinary users help identify spam, and not just administrators, thus vastly increasing the pool of spam fighters.

Blocking messaging spam  Using privacy options to guard against messaging spam - To combat messaging spam, many users choose to receive instant messengers only from people already on their contact list. Ex) With Yahoo Messenger, users can click Messenger -> Preferences -> Ignore List and check the box "Ignore anyone who is not on my Messenger List."

What do you do to Block Spam?  Delete the messages before opening.  Install a filtering Program.  Be careful in giving your personal information.  Read the private policy of the websites before submitting information.  Set preferences in Messenger spam.

What not to do?  Do not click the Remove Me Link.  Do not attack the Spammer.  Hack in to the site.  Threaten violence.  Don’t use spam to fight spam.

Why is Spam bad?  Cost.  Fraud.  Waste of other’s resources.  Annoyance Factor.

Discussion  Why do they send spam?  Is the spam effective as an advertisement?  Is the broadcasting also spam?

Discussion  Why spam is bad?  Which technology is more advanced? Technology for spamming or technology for anti-spamming?

Discussion  Personal experiences.. How often? How many? What contents?  What do you do to block spam?

References SMS+Spam+-+