Should there be a law that forbids people from sending email to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.

Slides:



Advertisements
Similar presentations
Microsoft ® Office Outlook ® 2003 Training Outlook can help protect you from junk Upstate Technology Services presents:
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Basic Communication on the Internet:
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Breaking Trust On The Internet
What is identity theft, and how can you protect yourself from it?
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Internet Safety/Cyber Ethics
Netiquette Rules.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
AND SPAM BY OLUWATOBI BAKARE
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Social impacts of the use of it By: Mohamed Abdalla.
Protecting Yourself Online (Information Assurance)
1 The Business Case for DomainKeys Identified Mail.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
SPAM Turning the tide Gregory Massel iWeek 2004.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Scams & Schemes Common Sense Media.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Computer Ethics.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
Computer Security By Duncan Hall.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Lesson 3 Safe Computing.
Unit 4 IT Security.
Information Security Session October 24, 2005
Presentation transcript:

Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang

Spam What is spam? It is received without consent It does not contain information about sender It does not have an unsubscribe option More than 13,000,000,000 spam messages are sent per day Spam accounts for 75%-90% of all traffic In 2004, 1 out of 500,000 persons would respond to spam, and about 400 responses would be received a day

Why Spam is Bad You receive spam without permission It can be used to spread viruses and malware Spam can be used to steal personal information such as financial data Computers can be turned into zombies computers and can spam personal contacts ISPs have to spend large quantities of money on spam filtering It is cheap, and is thus highly sustainable

Example of a zombie account

Bacn Different from spam: Advertisement s from companies Information about sales, items, etc. You have to sign up for them There is an unsubscribe option

Current U.S. Law Can-Spam Act of 2003 Spam must contain information about the sender (mailing address, phone number, etc.) Recipients have the choice to opt-out of s No scamming Caveats: Hard to enforce. (look in your spam folder)

How to improve on stopping spam Learn from the Aussies! More enforcement Anyone who violates these principles: 1. make sure you have consent to contact the recipient and can prove you have obtained it 2. include accurate information to identify yourself or your organisation as the authorised sender of the message 3. make sure your messages have a functional unsubscribe facility, so that recipients can unsubscribe at any time. will have to pay. ISPs should track down spammers that violate terms and impose legal action.

Don't want spam? Report it! from Forward messages to Contact your sender's ISP; they want to cut down on spam Contact your ISP's abuse desk

The Reality Spam exists because it is the natural course of action. It provides a means of exploitation on mass levels It makes the global population a phish farm Simplistic scams, phishing websites, and advertisement are what the majority of the world acknowledges spam to be Despite the automation, complex social engineering exploitation is at play Complex exploitation software has been written to take advantage of the reality of spam

Get over It Spam forces users to maintain computers at an elevated security level Extreme measures to disable spam will make awareness of new software exploits hard to come by Active measures to disable spam globally will result in a lower level of overall protection from viruses and malware The reason the global system of critical vulnerabilities works so well in assessing threats is because the world acts as testers(spam is an enabler). Getting rid of spam will pamper the world's computers into a vulnerable state, ultimately allowing more devastating attacks on the world's IT infrastructure. Forcing the spam engineers into obscurity will make them evolve past their current state, which is working for them just fine, into a more advanced state that will pose greater risk to recipients. Spam, regardless of law, is INEVITABLE, so we should accept what it is currently, get over it, and not force it to evolve into something more unstoppable and unmanageable.

Get over It Spam is inevitable. Even with anti-spam laws set in place, spammers are likely to continue their habits. With an immense amount of spammers out there it will very likely become overly costly to seriously enforce anti-spam laws. Rather, it should be the responsibility of private businesses to protect their customers against spam. Also, since spam can originate from any part of the world, it will be very difficult if not impossible to successfully implement. Anti-spam laws might endanger personal freedom in the web. We will need a very narrow definition of what is spam. Look at SOPA and PIPA; anti-spam can be used as an excuse, too.

Sources Edelstein, Julia. "Unsubscribing From Lists." Real Simple 12.7 (2011): 133. MasterFILE Premier. Web. 21 Apr U. Chi. L. Rev (Winter, 2005 ): words. LexisNexis Academic. Web. Date Accessed: 2012/04/