ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Basic Communication on the Internet:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Surrey Public Library Electronic Classrooms Essentials.
Staying Safe in Cyberspace. What do YOU do online? Send and receive Send and receive Shop Shop Research Research Instant messaging/chat.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Internet safety By Lydia Snowden.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
Internet safety By Suman Nazir
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Important Information Provided by Information Technology Center
Lesson 3 Safe Computing.
is short for electronic mail!
Information Security 101 Richard Davis, Rob Laltrello.
How to manage your s Tips and tricks.
Unit 4 IT Security.
Electronic Mail.
What is it? Why do I keep getting from Barracuda? SPAM.
Electronic Mail.
Electronic Mail Opening Activity: 411 of
Electronic Mail.
Electronic Mail.
How to manage your s Tips and tricks.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
How to manage your s Tips and tricks.
Presentation transcript:

ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus

Spam: Unsolicted Messages Spam is the use of electronic messaging systems to send unsolicited bulk messagesSpam Mainly , also Facebook, Twitter, forums, wikis, blogs etc. ▫UCE: unwanted commercial s ▫Not just commercial, often malware vector Viable: cheap to send messages, use of botnets Purpose: ▫Send users to websites (collect personal information), spread malware, sucker users in on pyramid schemes

Spam Terms (Wikipedia) Phishing: attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entityPhishing Botnet: collections of computers on the Internet configured to collectively perform a task, e.g. send spamBotnet harvesting: process of obtaining lists of addresses using various methods for use in bulk or other purposes usually grouped as spam harvesting

Spam: Legislation US: CAN-SPAM Act 2003CAN-SPAM Act 2003 Australia: SPAM Act 2003SPAM Act 2003 Our legislation covers commercial messages The sender must: 1.Have the consent of the receiver, either direct or implied via an existing business relationship 2.Accurately identify the sender of the spam 3.Have an unsubscribe option that must come into effect within 5 days Doesn’t cover international senders, non- commercial messages

Spam: Percentages Most of the sent is spam 2012 and 1 st half of 2013 – Kaspersky Labs

Spam: Country of Origin

Spam Characteristics: Unknown Sender Trying to sell products: equipment, pharmaceuticals etc. May involve money: I have $50M to shift Poor grammar, badly laid out Inconsistent mail headers ▫But too technical to delve into here Lots of links for you to click on Asks you to unsubscribe ▫If you do, it confirms your address is valid

Spam Characteristics: “Known” Sender Trusted entity (e.g. bank) or a friend Trusted entity: your account has been frozen, please click on this link to reset your password ▫Wants you to perform action based on trust from “friend” ▫Is vague, doesn’t say anything to prove they know you ▫Friend is in trouble, can you help them out, e.g. by sending them money ▫Or, click here, this is a great video of XYZ….

Other Spam: Instant Messaging Spim: instant messaging spamSpim Use of IM systems to send spam: Facebook, Twitter, AIM, Yahoo, AOL etc. Spim will probably overtake spam ▫Next generation uses less, IM more Click fraud: deliver hyperlinks that can be easily clicked on to direct users to malicious websites

Other Spam: SMS & MMS Unwanted messages through SMS or MMS (multimedia messages) on your ‘phone Can cost you to receive them (e.g. roaming) Replies to them can cost a lot ▫Premium phone numbers You may “subscribe” to a service, and then get charged for each message they send to you Can be very hard to unsubscribe

Fighting Spam There is no silver bullet for this You can never reach 0% incoming spam However, you can minimise it This requires a combination of technology and intelligence on your part Technology by itself is not enough!

Fighting Spam: Technology Use filtering software ▫Looks at message content and labels as spam/not spam. Sometimes accurate, sometimes not Use anti-virus software, keep it updated Use a personal firewall Keep your security patches up to date Whitelisting, blacklisting, greylistingblacklistinggreylisting ▫Each one has pros and cons

Fighting Spam: Intelligence Choose password that are not easy to guess Protect your address ▫Be careful who you give it to ▫Use Bcc when sending messages to lots of people ▫Don’t respond to spam, watch “unsubscribe” links ▫Watch web forms: collecting your personal data ▫Use multiple disposable addresses Don’t click on links in messages ▫Reach and check the link details ▫Type in by hand if necessary

Fighting Spam: Intelligence Protect your mobile number ▫Don’t send “free ringtones” to your phone ▫Be careful who you give your number to on-line Read terms & conditions: what on-line companies can do with your details Stay on top of current scams: Don’t open attachments! Don’t unsubscribe Don’t trust details: sender, subject line Report suspicious s, especially bank ones

Who to Report Spam To? ACMA: Forward the message to the Spam Intelligence Database at If spam say it’s from a trusted entity (e.g. a bank) then report it to them, to help other people If you think someone in your organisation has had their address book compromised, report it to the IT staff

Activity Login to your service here, or at home Research what spam filtering and spam detection mechanisms are available Configure your system to detect spam Look through your junk mail folder ▫Read through some spam messages ▫Assess why they should be considered as spam