Download presentation
Presentation is loading. Please wait.
1
Spam, Scam, and Slam Ira Goldstein – igoldstein@siena.edu
Department of Computer Science Siena College
2
Agenda Defining Terms Malware Personal Information Questions
3
Who? Image by Vincent Diamante Some rights reserved
4
Sockpuppet An online identity created and used for purposes of deception.
5
What Is… SPAM
6
Spam, Scam, and Slam Unsolicited Commercial E-Mail Defraud Malware
Nigerian (419) Stock “Great” Deals Lottery Phishing Malware
8
© 2010
9
RECEIVED A DIFFERENT ACCOUNT FROM YOUR NEXT OF KIN to claim your fund valued $10.7 millions dollars
13
Do Not Feed The Trolls Some rights reserved by tripu © 2010
14
Social Engineering Goal: Your Information Phone Call Physical Access
Phishing Spear Phishing
15
Phishing E-Mail or Instant Message Cast A Wide Net “Remember Me?”
Verify or Update Information A Problem With Your Account/Computer
16
Spear Phishing Your Name Local News Your School
Image CCSA by Michel van Eupen © 2010
17
What Is… Malware
18
What Is Malware? Malicious software malware
Any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations
19
What Does Malware Rely Upon?
User Rights File Attributes Bugs, vulnerabilities Zero Day Escalation of Rights End User Behavior
20
Types of Malware Vector Computer virus Computer worm Trojan horse
Activity Bot Mass Mailing Remote Attack (DDoS) Cryptocurrency Mining Spyware Rootkit Backdoor
21
Computer Viruses Self-replicating program
Attaches itself to a legitimate file Exchange infected files CDs or Flash Drives attachments
22
Computer Worms Self-replicating program Self-distributing program
Mass-mailing worm Internet worm
23
Trojan Horse Malware disguised as legitimate software
Usually tricked by some form of social engineering to install Not able to self-replicate
24
Some Malware Symptoms Performance Problems/Crashes
Unexplained Computer Behavior Antivirus or firewall protection is unexpectedly disabled Home Page Hijacking Search Engine Hijacking Pop up Advertisements Scareware
25
Passwords
26
Password Something that enables one to pass or gain admission: as
a spoken word or phrase required to pass by a guard a sequence of characters required for access to a computer system - Merriam-Webster On-Line a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource One Factor
27
Password Do’s UPPER And lower Case Digits Special Characters
Passphrase Wwtg2Dn! Longer Can Help Periodically Change
28
Password Don’ts Share Reuse Write Down Store Easily Guessed Dictionary
Names Mascot/Pet
29
Passwords in the News More than 70% of people would reveal their computer password in exchange for a bar of chocolate Most Common 4%: password 2nd Most Common (1.5%): 20% of Users: One of 5,000 Passwords
30
Personal Information
31
Data Privacy Data Leakage Protect Confidential Data
Personally Identifiable Information Financial Data Trade Secrets
32
Location Data Cell Towers SSID GPS
33
Google Dashboard https://www.google.com/settings/dashboard
Manage Google Data Location Data
34
SSID Database wigle.net
35
Tips Keep Your Operating System Updated Use Anti-Virus Software
Keep it up to date! Regular Scans Use a Firewall
36
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.