E-MAIL SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward.

Slides:



Advertisements
Similar presentations
The INTERNET.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Surrey Public Library Electronic Classrooms Essentials.
Breaking Trust On The Internet
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Fighting Spam Randy Appleton Northern Michigan University
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Spam Sonia Jahid University of Illinois Fall 2007.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
AND SPAM BY OLUWATOBI BAKARE
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Issues Raised by ICT.
Security Issues: Phishing, Pharming, and Spam
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Spam / Phishing Björn Bittins Sebastian Kühnau FHTW-Berlin.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Unit 9 Communication Services
Digital Citizenship By: Miranda Scorver.
Lesson 27 Communications and Collaboration
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Internet Use Mark Wheatley CSI Onsite
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
Legal & Ethical Issues Affecting E-Marketing The student will be able to: Distinguish between what is legal and what is ethical Distinguish between what.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Protecting Students on the School Computer Network Enfield High School.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
v=anwy2MPT5RE By Levi Nichols.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Get involved with your children online and encourage balanced use – set time limits Make sure they know who to talk to if they feel uncomfortable Talk.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
InternetInternet ISYS 1050 K. Steere. What is the Internet? A collection of local, regional, national, and international computer networks that are linked.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Misuses of ICT Malpractice and crime © Folens 2008.
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
Using Apps to Get and Share Information
Your Digital Footprint
Presentation transcript:

SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward to contact you for this business but I want you to assure me solemnly that you are a trustworthy, reliable, honest and capable to avoid cheating me in this business”

WHAT IS SPAMMING ? Spamming is the abuse of electronic messaging systems to send unsolicited, undesired bulk messages.

WHY SPAMMING ? Spamming is economically viable 1.advertisers have no operating costs beyond the management of their mailing lists 2.it is difficult to hold senders accountable for their mass mailings  spam  Instant messaging spam  Usenet newsgroup spam  Web search engine spam  Spam in blogs  Mobile phone messaging spam FORMS OF SPAMMING:

SPAMMING

spam What is Spam ? spam involves sending nearly identical messages to a few or thousands (or millions) of recipients by , with the purpose of advertising and gaining economic profits. How spammers operate ? Perpetrators of such spam ("spammers") often harvest addresses of prospective recipients. They create accounts on free webmail services, such as Hotmail, and they use bots to send the s. They send it from someone else's computer and network connection, they use open relays, open proxies or by commissioning computer viruses. Obfuscate message contents What is the context of such mails ? It includes pornographic context,announcements of get rich quick schemes, unlicensed computer software etc

The non-commercial side of spamming A number of evangelists have spammed Usenet and media with preaching messages A growing number of criminals are also using spam to perpetrate various sorts of fraud, and in some cases have used it to lure people to locations where they have been kidnapped, held for ransom, and even murdered During July 2006 there has been an enormous increase in unsolicited messages containing nothing but three lines from JRR Tolkien's The Hobbit Forged spam has been used as a tool of harassment worms or viruses may be spammed to set up an initial pool of infected machines

What are the dangers of spamming? It clutters your inbox It takes time to download It is annoying If you reply to them complaining then usually they retaliate in a most unpleasant way Children receive spam with inappropriate content They steal other peoples’ accounts, falsify identities to achieve their goal

spam in numbers Top 12 relaying spam countries The breakdown of spam relaying by continent is as follows: Spam in numbers An spam is sent to 600 addresses First large-scale spam sent to 6000 bulletin boards, reaching millions of people (June) 30 billion per day [4][4] (June) 55 billion per day [5][5]

Ethical Issues "Spam is the result a lack of ethics and integrity in regards to promotional activities on the internet. It's not a question of whether or not you get caught. It's a question of maintaining your ethics and integrity while still engaging in promotion, marketing and advertising." --Richard Lowe There are varying opinions on the ethical aspects of UBEs 1.some feel Spam is to be condemned 2.some others feel that spam is a mere extension of direct marketing on the Internet 3.others take a middle-man approach saying it is up to the end-user to decide what is Spam, and what is not spamming is a new phenomenon in cybernet and thus the basic foundations to fight it with legal act are not yet established Net abuse is not concerned a crime yet.

Is any protection against spam? providers are investing a lot of money in making new filters, applying bots that can figure out and block these s There are a lot of sites and people devoted on tracing, reporting and guiding other people how to fight spam New laws allow the prosecution and punishment of spammers

Discussion Questions Which is your opinion about spam, according to the three different ethical approaches? Is your opinion informed by personal experience? Is spamming legal or computer crime? Is blocking spam censorship?

Discussion January 24 th 2004 at the World Economic Forum in Davos Bill Gates predicted: -Technology would make spam "a thing of the past" within two years. Question : One month left before entering the year 2007 and almost 3 years after Bill Gate’s prediction and still spamming is something that everybody deals with in daily basis. Do you believe that spamming can be fought effectively?

Discussion Goodmail’ s approach on fighting spamming: “Bulk er should be charged a penny per message to bypass spam filters and to avoid being incorrectly tossed as junk.” Question : Knowing that other providers such as Yahoo were also interested in this idea do you think that by charging s will discourage spammers or is it just another way for companies to have an extra source of profit?

Origin of spamming Spam was named after a Monty Python sketch that was named SPAM To watch the video follow the link: