We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byCael Yarboro
Modified about 1 year ago
© 2009 Charles D. Knutson Unclogging My Spam, Phishing Attacks, Netiquette Dr. Charles D. Knutson Brigham Young University
© 2009 Charles D. Knutson Positives and negatives is amazingly useful and efficient Abuses of the technology Inappropriate content Technically destructive Criminal behavior Annoying and cumbersome Bandwidth limiting 2
© 2009 Charles D. Knutson Brief tutorial Individuals license domains byu.edu, lds.org, etc. Owner may manage subdomains cs.byu.edu Owner may support and manage users 3
© 2009 Charles D. Knutson Brief tutorial Messages routed across Internet Domain owner routes individual s to particular accounts Sending SMTP - Simple Mail Transfer Protocol Receiving POP - Post Office Protocol IMAP - Internet Message Access Protocol 4
© 2009 Charles D. Knutson Brief tutorial programs Microsoft Outlook Mac Mail Web-based services (Webmail) Microsoft Hotmail Yahoo! Mail Google Gmail America Online 5
© 2009 Charles D. Knutson concerns Malicious Spam Phishing attacks worms Annoying Hoaxes Education generally needed Forwarding Netiquette at work 6
© 2009 Charles D. Knutson Spam Generically -- Sending copies of the same message to large numbers of recipients who didn't ask for it , instant messaging, blogs, fax transmissions, cell phone messages Here we're concerned specifically with spam Most common form of spam 7
© 2009 Charles D. Knutson Spam Almost no cost to send an to millions of addresses Very profitable Which means -- people are buying stuff from these s! Requires very low hit rate to be profitable It will only stop when people stop clicking! 8
© 2009 Charles D. Knutson Spam - Volume 100 billion spam s sent each day 90% of all incoming corporate Dr. K receives around 2,000/month each day Most captured by spam filter Another handful manually deleted each day 9
© 2009 Charles D. Knutson Spam - Cost Fraud Dependent on content, obviously Lost productivity Lost bandwidth Support to alleviate the burden Hardware, software, personnel $20 billion per year in U.S. alone just to combat spam 10
© 2009 Charles D. Knutson Spam - Content Significant areas: Pornography Sexual products Fraudulent activities Indiscriminately sent to everyone Children can be exposed 11
© 2009 Charles D. Knutson Spam - Some statistics 80% of youth said they receive inappropriate on a daily basis. Such makes them: Annoyed – 51% Uncomfortable – 34% Offended – 23% Curious – 13% 38% do not tell their parents about receiving inappropriate 12
© 2009 Charles D. Knutson Spam - Solutions Never buy anything advertised by a spam !! Any company with whom you don't already have a relationship Do not use unsubscribe feature Confirms your is accurate Spam filters Not perfect, but very helpful 13
© 2009 Charles D. Knutson Spam filters Attempt to automatically detect and remove spam Very hard problem! False positives - Non-spam tossed into the junk folder When searching, include junk folder Missed positives - Spam that makes it through the filter into your inbox 14
© 2009 Charles D. Knutson Spam filters Solutions: Many programs have built-in Programs can be installed Server-based solutions Internet service provider (ISP) Generally a training phase Software learns from you as you identify spam 15
© 2009 Charles D. Knutson Phishing attacks Fraudulent attempt to gain access to usernames, passwords, credit card information, etc. Key source of identity theft 1.2 million computer users in US suffered losses in 2004 $929 million in personal losses UK losses doubled from '04 to '05 16
© 2009 Charles D. Knutson Phishing attacks Authentic-looking fraudulent s lead user to authentic-looking fraudulent websites User types in name and password, or credit card information 17
© 2009 Charles D. Knutson Phishing - Protection Don't click on the link in an Type it yourself, or click from favorites Many filters detect spam But don't rely exclusively! Double check the web address of the link to be sure Most are pretty flagrant 18
© 2009 Charles D. Knutson Phishing attacks 19
© 2009 Charles D. Knutson worms Attachment in the Trick you into clicking on it Installs itself Checks your address book Sends a copy to everyone May or may not be damaging 20
© 2009 Charles D. Knutson Hoaxes Benign worms that are spread entirely by… Gullible users!! Almost every that asks you to forward it to everyone in your address book ... is a hoax This is not an exaggeration! 21
© 2009 Charles D. Knutson Hoaxes - Samples Warning about cash back charges being placed on WalMart customers' credit cards Warning that the Obama health care reform bill mandates that seniors be given euthanasia counseling Internet-circulated coupon offers free lunch from Wendy's Electronic petition seeks to overturn Congressional vote granting Social Security benefits to illegal aliens 22
© 2009 Charles D. Knutson Hoaxes - Samples The planet Mars will make a remarkably close approach to Earth in August 2009 Warning that cell phone numbers are about to be given to telemarketers Warning about baby carrots made from deformed full-sized carrots which have been permeated with chlorine A new Pepsi soda can design omits the words "under God" from the Pledge of Allegiance 23
© 2009 Charles D. Knutson Hoaxes - Cost If all Internet users received a single hoax, spent 1 minute, and discarded ~$40 million If forwarded, spread is exponential 10 people per spread = 1,000,000 on the 6th hop Spammers harvest addresses from hoax s 24
© 2009 Charles D. Knutson Hoaxes - What to do Assume the is a hoax Attempt to independently validate If you can personally validate that the information is true... Send it to select individuals with whom you have a relationship And who don't mind receiving things If you can't... DON'T FORWARD IT! 25
© 2009 Charles D. Knutson Hoaxes - Validating Google Search for specific phrases See where that leads you Check hoax tracking sites Symantec McAfee Many others… … but these are absolutely credible 26
© 2009 Charles D. Knutson Forwarding What about forwarding other stuff? Any that actively encourages you to send it to everyone is very bad form forms a community or social network Must respect the rules of that social network 27
© 2009 Charles D. Knutson Netiquette Network etiquette Rules of proper social behavior in the new digital society Remember that users are human Never say in an or online something you wouldn't say in person Don't forward junk/hoax s 28
© 2009 Charles D. Knutson Netiquette Limit all forwarding to people you personally know, and who you know want to receive it from you The noise can be overwhelming! Lurk before you leap Understand the social rules of any new community before diving in and embarrassing yourself 29
© 2009 Charles D. Knutson Netiquette Be careful about "Reply to All" Accidentally spam a large group trying to respond to one user ALL CAPS IS SHOUTING!!!!!!!!!!! One exclamation point is enough! Use subject lines appropriately Helps users sort, find, prioritize 30
© 2009 Charles D. Knutson Netiquette BCC for multiple senders Otherwise you expose a large number of addresses to people who don't know each other Include relevant portions of that you're responding to Intersperse your comments 31
© 2009 Charles D. Knutson Netiquette Remember that emotion is not fully conveyed via Emoticons can help :) ;) :( :D... (HTML humor) Non-emotion can be helpful! Work through issues that would be too emotional face-to-face 32
© 2009 Charles D. Knutson Flaming Flame: Hostile or rude or communication That would never happen in person Flame bait: Trolling for a fight in cyberspace Flame war: Challenge accepted, combat engaged Generally very bad form 33
© 2009 Charles D. Knutson at work 34
© 2009 Charles D. Knutson Questions? Internet Safety Podcast Internet Safety Wiki wiki.internetsafetypodcast.com Dr. Charles Knutson 35
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
Setting up a Gmail Account & Safety Patrick Therrien Technology & Education Training Specialist.
HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET
Etiquette A re you -happy; that is, do you send too much? Did you send an that was misunderstood? Did the message you thought you sent.
Lifelong Learning Service Monday 30 th or Tuesday 31 st March :30pm Safe use of the Internet.
© 2009 Charles D. Knutson Identity Theft: Why Would Anyone Want My Identity? Dr. Charles D. Knutson Brigham Young University
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
Desktop Self-Defense Instructor: Eileen OShea An Infopeople Workshop Fall/Winter 2005.
Mozilla Thunderbird Management. Topic 1: Changing How is Organized Topic 2: Creating and Using Folders Topic 3: Attachments Topic 4: Organizing.
CYBER SECURITY-PHISHING: DON’T BECOME A VICTIM OF FRAUD.
© Copyright 2003 – Chesapeake NetCraftsmen, LLC SPAM Joe Roundy Senior Security Consultant
Personal Information Security and Malware Awareness Workshop Bard College at Simons Rock Information Technology Services (ITS) Summer 2012 (Please sign.
You and Your Business on the Internet Ray Mills Raymond Mills & Associates.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
CYBER SECURITY TRAINING Virginia Marine Resources Commission MIS Dept. October 2012.
WRAP and the Internet Presented by Anne Frank Anne Northeast WRAP Conference Amherst, MA 21 July 2005.
1.About ModemsAbout Modems 2.All About BroadbandAll About Broadband 3.Making ConnectionsMaking Connections 4.VirusesViruses 5.Data BackupData Backup 6.File.
Copyright Bluebird Sales and Marketing Ltd 2009 © eBusiness Programme Top 20 Marketing Tips “in one hour we’ll equip you with tools, hints and tips.
Information Systems Using Information (Higher and Intermediate 2)
Hot Topics in Technology Kent State University Committee Members: Jackie Kus Kristen Chorba Jenny Craig.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Insert your company logo here (on slide master). Insert your company logo here (on slide master) Developed by the Department of Communications, Information.
E-MARKETING (INTERNET MARKETING). E-MARKETING Marketing: A comprehensive process that involves every aspect of a business from designing its products,
Student Internet Use Tutorial and Agreement Modesto City Schools August 2011.
Computer Vulnerabilities 1. 1.Overview 2. 2.Threats to Computer Systems 3. 3.How Hackers Work 4. 4.Using the Internet Securely 5. 5.How We Make It Easy.
Hot Topics in Technology: Information every Dean should know! Northern Illinois University Jarquetta Egeston (Team Leader) Shaun Crisler DuJuan Smith.
© 2016 SlidePlayer.com Inc. All rights reserved.