Investigating Methods for Reducing Spam Email By: Steven Siggers Instructor: Marko Puljic.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
What is identity theft, and how can you protect yourself from it?
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Step - 1 Login to your account with the username and password sent to you in the membership package Ad Content Copy the Ad Content given in your Member.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
August 15 click! 1 Basics Kitsap Regional Library.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How to Use PolicyDeals Website ? Getting Started.
ICT Essential Skills. (electronic mail) Snail Mail.
Threats to I.T Internet security By Cameron Mundy.
Spam / Phishing Björn Bittins Sebastian Kühnau FHTW-Berlin.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Investing 101 – Part 3 Spotting Frauds and Scams.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
Using A presentation of the Elmhurst Public Library.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Computer and Internet Security By: Steven Siggers Instructor: Dr. Marko Puljic.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Welcome. What is it? Proceed to Student Registration Walkthrough Connect is an on-line assignment and assessment platform that helps students connect.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Phishing and online fraud What parents need to know.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
Online Advertising You’ve seen millions of these! But you need to know some of the reasons why companies use them And some basic details of how.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Guide to Using MYIBS Online Course Repository System using Claroline For IBS Students Only.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
& Google Gmail.
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Unit 4 IT Security.
How to manage your s Tips and tricks.
ONLINE BANKING ON YOUR PHONE
How To Blocks s On Gmail
What is it? Why do I keep getting from Barracuda? SPAM.
Ethics Tutorial Assignment#2
How to Register an Event
Internet Safety Vocabulary
Personal Safety Online
How to manage your s Tips and tricks.
What is Phishing? Pronounced “Fishing”
USA Softball Background Check
How to manage your s Tips and tricks.
Presented by: Sehar Munawar Registration no: B2F17ASOC0035 Presented to: Sir Waseem Iqbal & management & spam.
Presentation transcript:

Investigating Methods for Reducing Spam By: Steven Siggers Instructor: Marko Puljic

Introduction I choose this project to discover how users can reduce spam . Explain my objectives for reducing spam . My background information about spam will include the history of what spam is all about.

Objectives Explain the background information about spam . Discuss the history of Spam. Why users receive so much Spam. What types of Spam are present today.

What is Spam? Spam is an unwanted or messages posting usually advertising some product or service. Spam is also considered commercial advertising, often for uncertain products, or get-rich-quick schemes. Spam targets individual users with direct mail messages.

History of Spam Spam was invented in 1994 by 2 American lawyers named Canter and Siegel. The word spam itself comes from the American food producer, Hormel, who produces a meat product. Most spam s come from USA, but other countries such as Korea, Russia, and China are also sending spam.

Why users receive so much Spam? According to spamfighter.com, spam is considered as cheap marketing products. Spam messages are sent to millions of people that costs less than a dollar. Users should never purchase anything advertised by spam, because it increases more spam. So if there is something advertised by spam that interest you, find it somewhere else online.

What kind of Spam exist today? The most typical type of spam is an offering products or services. These s are filled with words such as free, viagra, loan, sex, etc. Phishing- s: You suddenly will get an from your bank, or credit card company with a warning that you should quickly change your password on your net banking because there is a possibility that a person has broken into your account. You click on the link and don’t realize that you are coming into a perfect copy of your banks website. Here you give your username and password, you come in, and get the right to change your settings followed by a message that everything is ok now.

Example of Phishing

References content/uploads/2009/01/ -spam.gif content/uploads/2009/01/ -spam.gif