How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Basic Communication on the Internet:
Primary Threats to Computer Security
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Breaking Trust On The Internet
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Internet Safety/Cyber Ethics
Netiquette Rules.
Computer Assisted Communication. Terms Asynchronous Blog Bulletin Board – Discussion Board Chat Chat Room.
The Internet, The Web, and Electronic Commerce
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
AND SPAM BY OLUWATOBI BAKARE
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
1 The Business Case for DomainKeys Identified Mail.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Tutorial 2: Basic Communication on the Internet: .
The Internet, the Web, and Electronic Commerce Chapter 2 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 2-1.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Computer-Assisted Communication
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CAN SPAM and Your Marketing Best Practices for Senders By Lars Helgeson Cooler .
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
The Internet, the Web, and Electronic Commerce Chapter 2 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 2-1.
Security fundamentals Topic 9 Securing internet messaging.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing tactics.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Internet Business Associate v2.0
Unit 4 IT Security.
What is it? Why do I keep getting from Barracuda? SPAM.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45

Agenda types of software used by each company how spam stoppers are getting better importance of ROI (Return on Investment) logic of combining antispam, antivirus, and antifraud software spam competition techniques for finding addresses groups who fight against spam history and future of spam recommendations

Pier 1 Imports MailFrontier used with Microsoft Exchange it protects enterprises from all -borne threats stops all unwanted before it enters your network protects against Spam, Viruses, Fraudulent s, & Policy violations stopping 97.95% of spam

Charter Communications IronPort C60 designed to handle larger volumes of web based console biggest problem is its management capabilities manages performance metrics, reporting, anti-spam and anti-virus scans mail for words and phrases set by corporate policies stopping 95% of spam

Catholic Diocese of Richmond PowerTools from Nemx scans for keywords defined administrators scans message body for keywords & sentences scans for attachments scans for banned senders auto-add disclaimers to messages uses the content filtering (messages you can and cannot receive) 65% spam reduction rate

First Banking Services of Florida Mail Warden Pro (from Wareford Technologies, Ireland) secures SMTP mail servers (Simple Mail Transfer Protocol) prevents explicit content, loss of data, racial and harassment jokes state-of-the-art protection 97% spam detection rate no additional software needed prevents spam from any country or language

How spam stoppers are getting better With the increasing amount of spam being imported daily, spam stoppers are getting better by selling more efficient user friendly software that is decreasing the amount of spam being sent to in-boxes. In the future the spam stopping industry will not decline, because there are computer hackers that will eventually find a way to get around your spam software, which will result in the demand for better, faster and stronger anti-spamming software.

Importance of ROI ROI – Return on Investment; each company did not perform a ROI, which was not a very reasonable approach because if they would have done this they could have concluded whether or not if by going with the choices they made would have been the best for their situation.

What is the logic of combining antispam, antivirus, and antifraud software? product marketing ad-ware, spy-ware, viruses and identity theft “warm and fuzzy feeling around the heart” – Rolf Butz cost factor vendor loyalty gaining consumers trust

Spam Competitors Most spam comes from individuals More than 2 billion spam s sent daily Most competition for spam comes from competitors Techniques for finding addresses Scanning chat rooms & news groups for sign Buying lists from other spammers Generating addresses using common words

Groups who fight against spamming WHOA – reports harassing spam to ISP providers SpamCop – interprets full header of spam SpamCon – uses Can-Spam Act Laws ISP’s – lawsuits filed by four major ISP’s AOL EarthLink Yahoo Microsoft

History of Spam First spam sent in 1978 Arpanet; to advertise conference for new technology 320 addresses allowed in To: line, resent 3 times Davis Wolfgang Hawke First major spammer Former Neo-Nazi leader

History of Spam continued… Passed in 2003 laws that regulate commercial s accurate header, subject line, and opt-out option disclose advertisements and provide postal address punishments – heavy fines and/or jail time Can-Spam Act

Future of Spam Will get worse before it gets better finding ways to get around laws obtain permission to send s could lead to identity theft

Recommendations do not display your address in chat rooms or newsgroups Make addresses into an image Alter address when posted online then alert others to remove no_spam Read all privacy statements Check all opt-in and opt-out boxes Consider using two addresses Send copy of spam to Complain to users ISP Be aware of current scams