Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Kalpesh Vyas & Seward Khem
Basic Communication on the Internet:
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
Barracuda Security Service. Barracuda Networks Introduction to Barracuda Security Service 2 Easy to Deploy Cloud-based security Nothing.
AVG Internet Security 7.5 Product presentation.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
May 22, eWin Presented by Ben Serebin Combating Spam Server-side Purpose : to provide insight into the steps an organization.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Exchange deployment at CERN and new ideas for SPAM fighting Michel Christaller, Emmanuel Ormancey, Alberto Pace.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
AND SPAM BY OLUWATOBI BAKARE
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Copyright© Microsoft Corporation Speaker:Engagement consultant Title of presentation:Assessment of the Environment Length of presentation: 45 minutes Audience:Customer.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
SmartLog X 3 TEAM Basic SmartLog X 3 TEAM Basic DescoEMIT.com USER STATUS USER EDIT TEST LOG ADMIN TEST MACHINE SCHEDULE INSTALL System Requirements:
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Anti Phishing & Spam -- by lynn. Spam Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Anti-Spam Research Group (ASRG) 56 th IETF Meeting March 20, 2003 Paul Q. Judge.
Honeypot and Intrusion Detection System
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Module 6 Planning and Deploying Messaging Security.
TEAM Basic TotalElectrostatic ManagementAwareness&
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
Endian Firewall Community Edition Roy Hickman Technology Director Peck Community Schools #
Anti-Spam Tagging Al Lilianstrom. Spam Tagging The Computing Division is testing a Spam Tagging solution Based on SpamAssassin All incoming mail to the.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
Module 7 Planning and Deploying Messaging Compliance.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
What is Spam? d min.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Implementing Microsoft Exchange Online with Microsoft Office 365
A Network Security -Firewall Bruce Turin.
McAfee Antivirus Support By Techdotcomp nd Ave, Seattle, WA 98122, USA Phone: Based on Seattle, WA.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Anti-Spam Managing Spam with Kerio Connect
TMG Client Protection 6NPS – Session 7.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
A Study On Solutions To Spam
Cloud Security for Endpoints
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Microsoft Virtual Academy
Implementing Firewalls
Presentation transcript:

Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!

HTML allows documents to be viewed … people needed to communicate … Development of Organization Use-employee interaction Organization Use-employee interaction Marketing Use-scams, ads, customers Marketing Use-scams, ads, customers Overview

Definition “ Unwanted s indiscriminately sent through various mailing lists to individuals and groups ” “ Unwanted s indiscriminately sent through various mailing lists to individuals and groups ”WHY?WHO? Solutions : eg: Brightmail and Spam Bully Outgoing Issue Affects PC/Network as Spam is also sent out Affects PC/Network as Spam is also sent out Viruses: MyDoom Viruses: MyDoom Incoming Issue Average American will get more than 2200 spam messages Average American will get more than 2200 spam messages and 3600 by 2007 and 3600 by 2007 Using 2 mins/day, 4400 mins=74 hours given up Using 2 mins/day, 4400 mins=74 hours given up HTML use for anti-filtering Spam - Overview

Users: SoftLandMark, FutureQuest Technique adoption learns from spam messages Self adjusting Anti-Spam – Comparison Spam Bully Clients: Avaya, eBay, MSN Decoy addresses RECEIVE spam Saving of $72,222 from loss of time due to spam Cost of $12, million users Brightmail Server

Spam –Problems False positives False positives safeguards safeguards rigorous accuracy standards rigorous accuracy standards Instant deployment of updates Instant deployment of updates Lost user productivity Resource depletion

Anti-Spam – Technical Description Pro’s : -at point entry -saves resources Con’s: - smaller organizations -some prefer no services running at gateway Pro’s: - reduced downtime -multiple services on one dedicated machine Con’s: - enough resources to run other services Pro’s: smaller organizations plug and play Con’s: multiple installations

Anti- Spam – Technical Description Anti- Spam – Technical Description Brightmail Protection - Probe Network - - Probe Network - World-largest network collects spam using over 2 million decoy addresses - BLOC – - BLOC – operations centers that collect mail from Probe Network and develop countermeasures “ new filter updates every 5 – 8 minutes ” Spam Bully Protection - Bayesian Filtering – - Bayesian Filtering – content based, self learning Common Modules - White lists and black lists – - White lists and black lists – specified by firms, organizations - Custom Rules – - Custom Rules – specified by users

Anti-Spam – Variations and Standard Bodies/ Organizations Brightmail Brightmail Anti- Spam Enterprise Edition Version 5.5 Brightmail Anti- Spam Service Provider Edition Brightmail Anti- Fraud Spam Bully Outlook Version ( ) Outlook Express Version ( ) Outlook Version ( Beta) Outlook Express Version ( Beta) 1.Coalition against unsolicited Commercial (ICAUCE) - not-profit, international organization which helps its members and media become aware of spam issues and how to deal with spam 2.Federal Trade Commission (FTC) - protect consumers and business from Internet scams 3.Internet Society (ISOC) - provides its members and users with information about Internet issues 4.SpamAbuse.org - They maintain a blacklist of companies that have been reported 5.SpamCon Foundation -spam fighting organization that provides its members and users with a blacklist of companies

NetBarrier: firewall protection, unused ports closed, not for the novice user SpamAssassin: heuristic testing, point earned vs. set limit, user friendly Spam Killer: 3 levels of protection-integrity analysis, heuristic detection, content filtering, minimal management, small scale purposes ideal Symantec Norton AntiSpam: custom filter, knowledge of this feature is required, foreign languages are not recognized, limited configurability SpamWatch for Eudora: self learning filter, ranking system, only available for Eudora paid users Anti-Spam – Alternatives AT THE GATEWAY: AT SERVER:

Summary & Questions?