I NDIANA U NIVERSITY C A N N I N G S P A M A T Copyright Notice Copyright Merri Beth Lavagnino, Marsha Waren, and Rick Jackson, 2003. This work is the.

Slides:



Advertisements
Similar presentations
Copyright Kathy J. Lang and Ed Mahon, This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Advertisements

Office of Information Technology Affiliates/Guests – Who are these people and how do we give them services? Copyright, Barbara Hope, University of Maryland,
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Crisis Communications for Security Issues: A Nightmare You Can Manage Marilu Goodyear Donna Liss Allison Rose Lopez Jenny Mehmedovic The University of.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Net Snippets The Leading Internet Research and Information Management Platform Copyright This work is the intellectual property of the author. Permission.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Purdue University Calumet Enrollment Services Center Integrated Service Delivery In-person and on the Web Beth Pellicciotti Assistant Vice Chancellor Academic.
John L. Baines OIT Security and Compliance Retention: Preserving Public Records.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Copyright 2008, Elizabeth A. Evans. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Procurement From the 20 th to the 21 st Century Copyright Byron Honoré This work is the intellectual property of the author. Permission is granted.
Making the Pieces Fit Together Barbara Draude, Director, Academic and Instructional Technology Services Middle Tennessee State University Lisa Rogers,
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
INDIANAUNIVERSITYINDIANAUNIVERSITY Automated Network Isolation at Indiana University David A. Greenberg Information Technology Security and Policy Office.
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Unraveling Web Development PRESENTERS: Bob Nakles and Paras Kaul, George Mason University.
University of California, Irvine Security Access Management at UC Irvine: Adding Decentralization and Ending Paper Mark Askren, Assistant Vice Chancellor.
Embedded Librarian Program: Librarians and Faculty Partnering to Serve Online Students NERCOMP Annual Conference Innovation and Reliability: Finding the.
Jeff McKinney Exchange to Mirapoint Migration January 11, 2006 Securing Exchange to Mirapoint Jeff McKinney University of Maryland Dept of Electrical.
Copyright - L. Thanasides, 2002 Using the Right FACTS Can Be Informative: Florida’s Statewide Student Information System Linda Thanasides Marsha Stickel.
1 Outsourcing Student & Other Collaboration Services Wendy Woodward Director, Technology Support Services Copyright Wendy Woodward This work.
Putting the We in… We are Penn State! Copyright [Carol Findley, Lisa Dibert] [2003]. This work is the intellectual property of the authors. Permission.
Invent the Future. Some information about VT ~28,000 students; 83% UG/17% Graduate Most users publish/utilize a single address such as
MIT Info Group, January 19, 2005 Page 1 The CAN-SPAM Act and what it means for MIT communicators MIT Info Group, January 19, 2005 Marsha Sanders Senior.
1 No More Paper, No More Stamps: Targeted myWSU Communications Lavon R. Frazier April 27, 2005 Copyright Lavon R. Frazier, This work is the intellectual.
Herding CATS: the Community of Academic Technology Staff Lou Zweier, Director CSU Center for Distributed Learning The California State University NLII,
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
Copyright Michael White and Sandra Thompson, This work is the intellectual property of the author. Permission is granted for this material to be.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
Taking Cyber Security Awareness to the Street Community Aware.
Module 9 Configuring Messaging Policy and Compliance.
UWM CIO Office Where Did These Customizations Come From? Do We Need Them? March 14, 2007 Jill Unglaub, Senior Application Analyst Information and Media.
March 21, 2006 NERCOMP 2006 Worcester, Massachusetts 1 Copyright Sunny Donenfeld, This work is the intellectual property of the author. Permission.
Telecommunications Communication over a long distance; Distant communication.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
Module 9 Configuring Messaging Policy and Compliance.
Learning and Engagement in Library Spaces Suzanne E. Thorin Ruth Lilly University Dean of University Libraries and Associate Vice President for Digital.
Security Access Management at UCI – Slaying the Paper Forms Dragon Mark Askren, Assistant Vice Chancellor Valerie Jones, Project Lead Jennifer Lane, Help.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
Module 7 Planning and Deploying Messaging Compliance.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA Bringing IT All Back Home Centralized Systems in a Decentralized.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Copyright [Dr. Michael Hoadley, Chat Chatterji, and John Henderson ] [2004]. This work is the intellectual property of the authors. Permission is granted.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Overview Concern about free speech issues –One person’s SPAM is another person’s valued Have used a combination of: –policy, –staff follow up, and.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
University of Southern California Identity and Access Management (IAM)
Breaking Down Barriers & Building Bridges Improves Customer Satisfaction & Efficiency Wendy Woodward | March 15, 2011 Copyright Wendy Woodward 2011.
Julian Hooker Assistant Managing Director Educause Southwest
Project Prioritization Made Easy
Defining an IT Workflow, from Request to Support
University of Southern California Identity and Access Management (IAM)
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Bad News Messages: How Much and How Often?
Presentation transcript:

I NDIANA U NIVERSITY C A N N I N G S P A M A T Copyright Notice Copyright Merri Beth Lavagnino, Marsha Waren, and Rick Jackson, This work is the intellectual property of the authors. Permission is granted for this material to be shared for non- commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the author.

I NDIANA U NIVERSITY C A N N I N G S P A M A T Canning SPAM at Indiana University: What’s Possible & What’s Not Merri Beth Lavagnino, Deputy IT Policy Officer Marsha Waren, Senior Communications Specialist Rick Jackson, Manager, Messaging

I NDIANA U NIVERSITY C A N N I N G S P A M A T Outline of Presentation Merri Beth: Overview of the problem and the legal issues to be considered Marsha: Educational campaign Rick: Technical options

I NDIANA U NIVERSITY C A N N I N G S P A M A T What Was the Problem? Number of “Unsolicited Commercial ” reports to IT Incident Response

I NDIANA U NIVERSITY C A N N I N G S P A M A T Who Needed to Be Involved? Information Technology Policy Office: handles Incident Response Messaging Team: manages the systems Support Center: provides user support, for example, on how to set your filters in Departmental Services: provides support to computer professionals in departments Communications and Planning Office: coordinates user and public communications about information technology University Counsel: legal counsel for the university

I NDIANA U NIVERSITY C A N N I N G S P A M A T Education Project To engage our users in protecting their IU addresses FTC found that: –100% of addresses posted in CHAT ROOMS received spam –86% posted at NEWSGROUPS or on WEB PAGES –50% at free WEB PAGE SERVICES –27% from MESSAGE BOARD postings –9% from SERVICE DIRECTORIES

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Project Our goal a year ago: –To assist our users in dealing with spam when they do receive it, by providing an opt-in filtering service Our goal today: –To keep our systems running!

I NDIANA U NIVERSITY C A N N I N G S P A M A T Legal Issues to Consider First Amendment –Does NOT apply to fraudulent s, deceptive advertising, illegal activities To burden free speech, must show compelling governmental interest –Degradation of service, inability to deliver in a timely manner, etc. Take all possible actions to avoid the necessity of burdening free speech and to remove the constraints as soon as possible

I NDIANA U NIVERSITY C A N N I N G S P A M A T Legal Summary To the maximum extent possible, keep control of communications in the hands of the individual users If central action taken: –Document the problem –Actions narrowly tailored to fit the problem –Apply to fraudulent communications only

I NDIANA U NIVERSITY C A N N I N G S P A M A T Educating Users Initiated University-wide Spam Communications Campaign Technology organization (UITS) to serve as model. Advance compliance requests to: –UITS staff –IU webmasters –Departmental technology support providers

I NDIANA U NIVERSITY C A N N I N G S P A M A T Updated our Knowledge Base (KB) about spam – "What is spam ?" –"What does Indiana University do about spam" –"What is fraud, and what should I do about it?" –"What can I do to avoid spam ?” –"What should I do when I get spam ?" Educating Users

I NDIANA U NIVERSITY C A N N I N G S P A M A T Educating Users Pervasiveness of address harvesting Created new KB articles: –Protecting Web pages from harvesting With form template –Protecting newsgroup & chat postings –The risks of autoresponse (“vacation”)

I NDIANA U NIVERSITY C A N N I N G S P A M A T Educating Users Included info in educational materials Published two-part article in faculty/staff newspaper Announced in technology newsletters on both core campuses (40,000 recipients) Presented at committee meetings, Infoshares, departments, etc. Developed spam brochure

I NDIANA U NIVERSITY C A N N I N G S P A M A T Educating Users Incident Response modified communications with users: –New autoreply to address spam complaints –New boilerplate message to inform users with spam problems how to protect themselves and where to get help

I NDIANA U NIVERSITY C A N N I N G S P A M A T Educating Users Teaching users how to protect themselves was very effective in reducing the number of complaints about spam.

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Definition Environment Anti-SPAM Measures

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options SPAM: –Special –Processed –Annoying –Mail

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Environment: –~ Million inbound messages/day –~ 1 Billion/year –~100 % increase in six months

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options IU Environment: –Mail Services for all campuses –120,000 IMAP users –30,000 Exchange users

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options How much spam is too much? –Two occasions with multi-day delays in processing mail –Data suggest that since October 2002 spam accounts for 40-60% of all inbound mail to IU.

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options The Plan: –1 st Amendment concerns –Build a system users to choose to use

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Three-prong Attack: –SPAM Filtering –Black Lists –White Lists All measures should be ‘opt-in”

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Spam Filtering: –Inbound mail examined –Confidence levels assigned –Rules applied on mailbox servers –Action taken defined by individual

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Black Lists: –Mail rejected based on sender –Lists created by filtering software –Individuals will be able to look up what is being blocked

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options White Lists: –Individuals create lists of domains or of individuals from whom they will accept mail –Senders not on the list, must reply correctly to a message in order for your mail to be delivered.

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Reality Part 1: –These measures WILL NOT stop SPAM! –These measures WILL have a huge impact on resources

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Reality Part 2: –Spam level spikes caused denial of service. –Spam levels continue to cause problems with mail delivery –After second spam induced denial of service we took action to try and block inbound spam –Currently unable to implement opt-in solutions due to flood of spam

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Real-time Block Listing: –DNS-based database of IP addresses of spam sources –Queried in real time by mail systems –~8,000 messages per hour blocked

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options Future Reality: –Spam will continue to increase at alarming rates in lieu of legislated restrictions. –Spammers are working to circumvent anti- spam measures. –The solution will be multi-faceted and will have to be updated constantly.

I NDIANA U NIVERSITY C A N N I N G S P A M A T Technical Options NOTHING WILL STOP SPAM! Goal is to make it more manageable.