GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

How to Use Stowe School District
Basic Communication on the Internet:
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Google Apps: Google Mail Got Gmail?....Need Help? Mrs. Connor.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Clean Out the Junk! Outsmarting Unsolicited NUIT Tech Talk Presentation February 18, 2005 Sherry Minton Dan Frommer.
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
Fundamentals of Electronic Mail From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Advantages.
August 15 click! 1 Basics Kitsap Regional Library.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
AND SPAM BY OLUWATOBI BAKARE
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Unit 9 Communication Services
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Unit 10 Communication Services
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Can You Hear Me Now? Communication for Teachers Using Microsoft Outlook.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Outlook Web App Crash course. Outlook Agenda Login Login Reset Password Reset Password Getting Started in Outlook Web App Getting Started in Outlook Web.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Testing External Survey Automatic Credit Granting Shepherd University Department of Psychology.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Schools-On-I-Net and Google Apps for Education. Good-bye Yellow, Hello Blue Effective July 1, 2008.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
11 MICROSOFT OFFICE OUTLOOK 2003 AND MICROSOFT OUTLOOK EXPRESS Chapter 4.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Network System Security - Task 2. Russell Johnston.
and Network Management Presented by: Information Technology.
Unit 3 Section 6.4: Internet Security
Lesson 3 Safe Computing.
is short for electronic mail!
Yahoo Support Ireland Toll-Free Number:
What is it? Why do I keep getting from Barracuda? SPAM.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Cybersecurity Simplified: Phishing
Presentation transcript:

GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans, spyware, worms, frauds, drugs and more. Currently, the most used method to control spam are filters. They apply several criteria to the incoming s to identify spam.

John Doe John’s MailboxSpam Filter Mail Server Uncle Albert Spammer Inbox Junk Mail SPAM FILTERS The problem is that spammers are getting smarter, and they are using a number of techniques to circumvent the filters. The result is that spam bypasses the filters and some is delivered to your inbox, and even worse, legitimate messages are also misidentified as spam.

John Doe John’s Mailbox FIGTSPAM tm Mail Server Inbox OUR APPROACH It is time to place the doorman FIGTSPAM tm at the entrance of the inbox and let only well known people in. We accomplish this by creating a list of approved senders, and by providing the user (John in this example) with the tools to keep that list updated with only people he trusts. Approved Senders Uncle Albert Sister Suzie Brother Michael Auntie Gin Spam Control System FIGTSPAM tm is a trademark of Suncoast Secure Mail tm and its acronym means Find, Grab and Terminate Spam by using a Personal Authorization Method. FIGTSPAM tm is a patent-pending innovative and efficient spam control system not based on filters.

John Doe John’s Mailbox FIGTSPAM tm Mail Server Inbox PASSCODE AND PERSONAL QUESTIONS John also needs to create a Passcode and a list of personal questions about himself. This is a one time task, and it only needs maintenance once in a while. Approved Senders Uncle Albert Sister Suzie Brother Michael Auntie Gin Passcode Spam Control System Zerimxv21 List of Personal Questions 1. City where I Live 2. My Phone Number 3. Co. Where I work

What happens with people who want to contact John, but are not in his approved list of senders? In this case the message is not initially delivered to John’s inbox. Our system returns a message to the sender, and asks him/her to access an Internet page. On that page the sender must answer one of the questions that John previously defined (e.g. city where he lives). Only people who know him will be able to answer correctly. After a correct response, John’s also previously defined Passcode will be provided to the sender along with simple instructions on how to use it. Then all the sender has to do is include this Passcode in the Subject line or in the message body and send the message again. Now our system will deliver the message to John, and add the sender's address to his approved list of senders. This will give this sender access to send messages to John in the future until he removes it from his approved list. SENDERS NOT IN THE APPROVED LIST

John Doe John’s Mailbox FIGTSPAM tm Mail Server Inbox SENDERS NOT IN THE APPROVED LIST Approved Senders Uncle Albert Sister Suzie Brother Michael Auntie Gin Passcode Spam Control System Zerimxv21 List of Perssonal Questions 1. City where I Live 2. My Phone Number 3. Co. Where I work Brother George Since George is not in John’s approved list of senders, his mail is rejected and he is directed to John’s list of personal questions. After George answers one question correctly, he will receive the Passcode

John Doe John’s Mailbox FIGTSPAM tm Mail Server Inbox SENDER ADDED TO THE APPROVED LIST Approved Senders Uncle Albert Sister Suzie Brother Michael Auntie Gin Brother George Passcode Spam Control System Zerimxv21 List of Perssonal Questions 1. City where I Live 2. My Phone Number 3. Co. Where I work Brother George Passcode in Subject or Body After a correct response, John’s also previously defined Passcode will be provided to George along with simple instructions on how to use it. Then all he has to do is include this Passcode in the Subject line or in the message body and send the message again.

John Doe John’s Mailbox FIGTSPAM tm Mail Server Inbox SENDERS NOT IN THE APPROVED LIST Approved Senders Uncle Albert Sister Suzie Brother Michael Auntie Gin Brother George Passcode Spam Control System Zerimxv21 List of Perssonal Questions 1. City where I Live 2. My Phone Number 3. Co. Where I work Spammer Most spammers make up the originator address, so they will not receive back the instructions on how to access John's defined questions. They also use automatic servers to send the same message millions of times, so they will not be typically answering questions or reading instructions. Regardless of the above, assuming that they receive the instructions and access the page with John's questions, they will not know the correct answers.

John Doe John’s Mailbox FIGTSPAM tm Mail Server Inbox ADDITIONAL FEATURES Reports Mail Rejected Mail Statistics Ans. Questions Aliases Spam Control System Alias1 Alias 2 Contact Me Web Form from Subject Message John can also create temporal alias s forwarded to his real account, so he can use them while he is shopping or communicating with unknown persons or companies. John has also access to several activity reports to help him track the non- approved senders and a personalized Internet Contact-me form. Contact Internet Shopping