Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the email addresses.

Slides:



Advertisements
Similar presentations
Evaluating the Internet by Ms. Gould. Uses of the Internet The Internet has so much information available to find It can be used to find information or.
Advertisements

Information and resources
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Important Facts you should know about the Net
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
Chapter 5 Identity Theft and related topics. Synopsis What is identity theft? What is phishing? How does phishing work? What is pharming? Whose identity.
August 15 click! 1 Basics Kitsap Regional Library.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Spam and Anti-Spam By Aditi Desai Yousuf Haider. Agenda Introduction Purpose of Spam Types of Spam Spam Techniques Anti spam Why Spam is so Easy Anti.
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Computer damage. The dangers Computer programs can get onto your computer and cause damage Junk s (called spam) and junk instant messages (called.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
websites that work James Pennington Lead IT Consultant.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
E-commerce--is Based on the use of internet-commerce is fasting becoming an alternative.
The Internet contains an infinite number of high- quality, interesting, intriguing, and well-designed sites, and surfing on the Web is usually a source.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
1 1 Best Practices for End Users Anti-Spam Research Group IETF 56 - San Francisco March 20, 2003 John Morris ftp://67.cdt.org/pub/ietf56-asrg-spamreport.ppt.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Moral, Social and Ethical issues associated with the Internet
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Listservs & Discussion Forums ICT Applications in School Libraries.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Return to the PC Security web page Lesson 6: Improving Security.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
Principles of Marketing
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Wikispam, Wikispam, Wikispam PmWiki Patrick R. Michaud, Ph.D. March 4, 2005.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Safety.
CYBER SECURITY...
Why is it important? ❏ Most website owners do not think that if they paste address on page or post than they have too much risk of spam. ❏
Information Security Session October 24, 2005
Spam Detection Algorithm Analysis
ICT Communications Lesson 3: Internet Life and Privacy
How to manage your s Tips and tricks.
Bell Ringer How can you protect your self online?
NETIQUETTE Pn. Jamilah Binti Yusof.
How to manage your s Tips and tricks.
Presentation transcript:

Chapter 6 SPAM

Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses Damage caused by spam Quick spam reduction techniques Serious spam control techniques

What is spam spam is unsolicited with advertisements, often stupid, sometimes offensive, and rarely with something you want/need. Examples:  Free religious t-shirts  Beautiful girls from …  Organ enhancing meds/herbs  Medications 

Why does spam keep coming It is profitable. (just by the numbers) Note: Many legitimate companies may send you commercial offerings over after (perhaps in some underhanded manner) getting your premission (opt-in). You may just as easily opt out; the instructions SHOULD be in the .

Specialty spam Malware and scam distribution Hobbit spam Empty spam SPIM Non- Spam (posted to dicussion groups, forums, blogs, etc...)

Why doesn't someone stop the spammers Very hard to do....  Change IP address  Go overseas Over 90% of today is consistently spam.

How do spammers get the addresses Website Harvesting Publicly available address books on web-based sites Dictionary Spamming Commercial lists Newsgroups, discussion forums, interactive websites Contests... forwarding Data theft

Damage caused by spam It costs money Wasted Productivity/time disconnect Annoying and offensive Danger to children Carries malware and scams Can get you kicked off the net

Quick spam reduction techniques NEVER respond to spam Don't post your address on the web Don't use mailto, use the code on page 173 Turn off image display in programs Turn on junk filtering

Serious spam control techniques Install an anti-spam program Fight back; send s to abuse at the correct ISP address.