Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2009 Charles D. Knutson Unclogging My Email: Spam, Phishing Attacks, Netiquette Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net.

Similar presentations


Presentation on theme: "© 2009 Charles D. Knutson Unclogging My Email: Spam, Phishing Attacks, Netiquette Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net."— Presentation transcript:

1 © 2009 Charles D. Knutson Unclogging My Spam, Phishing Attacks, Netiquette Dr. Charles D. Knutson Brigham Young University

2 © 2009 Charles D. Knutson Positives and negatives  is amazingly useful and efficient  Abuses of the technology  Inappropriate content  Technically destructive  Criminal behavior  Annoying and cumbersome  Bandwidth limiting 2

3 © 2009 Charles D. Knutson Brief tutorial  Individuals license domains  byu.edu, lds.org, etc.  Owner may manage subdomains  cs.byu.edu  Owner may support and manage users  3

4 © 2009 Charles D. Knutson Brief tutorial  Messages routed across Internet  Domain owner routes individual s to particular accounts  Sending  SMTP - Simple Mail Transfer Protocol  Receiving  POP - Post Office Protocol  IMAP - Internet Message Access Protocol 4

5 © 2009 Charles D. Knutson Brief tutorial  programs  Microsoft Outlook  Mac Mail  Web-based services (Webmail)  Microsoft Hotmail  Yahoo! Mail  Google Gmail  America Online 5

6 © 2009 Charles D. Knutson concerns  Malicious  Spam  Phishing attacks  worms  Annoying  Hoaxes  Education generally needed  Forwarding  Netiquette  at work 6

7 © 2009 Charles D. Knutson Spam  Generically -- Sending copies of the same message to large numbers of recipients who didn't ask for it  , instant messaging, blogs, fax transmissions, cell phone messages  Here we're concerned specifically with spam  Most common form of spam 7

8 © 2009 Charles D. Knutson Spam  Almost no cost to send an to millions of addresses  Very profitable  Which means -- people are buying stuff from these s!  Requires very low hit rate to be profitable  It will only stop when people stop clicking! 8

9 © 2009 Charles D. Knutson Spam - Volume  100 billion spam s sent each day  90% of all incoming corporate  Dr. K receives around 2,000/month  each day  Most captured by spam filter  Another handful manually deleted each day 9

10 © 2009 Charles D. Knutson Spam - Cost  Fraud  Dependent on content, obviously  Lost productivity  Lost bandwidth  Support to alleviate the burden  Hardware, software, personnel  $20 billion per year in U.S. alone just to combat spam 10

11 © 2009 Charles D. Knutson Spam - Content  Significant areas:  Pornography  Sexual products  Fraudulent activities  Indiscriminately sent to everyone  Children can be exposed 11

12 © 2009 Charles D. Knutson Spam - Some statistics  80% of youth said they receive inappropriate on a daily basis.  Such makes them:  Annoyed – 51%  Uncomfortable – 34%  Offended – 23%  Curious – 13%  38% do not tell their parents about receiving inappropriate 12

13 © 2009 Charles D. Knutson Spam - Solutions  Never buy anything advertised by a spam !!  Any company with whom you don't already have a relationship  Do not use unsubscribe feature  Confirms your is accurate  Spam filters  Not perfect, but very helpful 13

14 © 2009 Charles D. Knutson Spam filters  Attempt to automatically detect and remove spam  Very hard problem!  False positives - Non-spam tossed into the junk folder  When searching, include junk folder  Missed positives - Spam that makes it through the filter into your inbox 14

15 © 2009 Charles D. Knutson Spam filters  Solutions:  Many programs have built-in  Programs can be installed  Server-based solutions  Internet service provider (ISP)  Generally a training phase  Software learns from you as you identify spam 15

16 © 2009 Charles D. Knutson Phishing attacks  Fraudulent attempt to gain access to usernames, passwords, credit card information, etc.  Key source of identity theft  1.2 million computer users in US suffered losses in 2004  $929 million in personal losses  UK losses doubled from '04 to '05 16

17 © 2009 Charles D. Knutson Phishing attacks  Authentic-looking fraudulent s lead user to authentic-looking fraudulent websites  User types in name and password, or credit card information 17

18 © 2009 Charles D. Knutson Phishing - Protection  Don't click on the link in an  Type it yourself, or click from favorites  Many filters detect spam  But don't rely exclusively!  Double check the web address of the link to be sure  Most are pretty flagrant 18

19 © 2009 Charles D. Knutson Phishing attacks 19

20 © 2009 Charles D. Knutson worms  Attachment in the  Trick you into clicking on it  Installs itself  Checks your address book  Sends a copy to everyone  May or may not be damaging 20

21 © 2009 Charles D. Knutson Hoaxes  Benign worms that are spread entirely by…  Gullible users!!  Almost every that asks you to forward it to everyone in your address book ... is a hoax  This is not an exaggeration! 21

22 © 2009 Charles D. Knutson Hoaxes - Samples  Warning about cash back charges being placed on WalMart customers' credit cards  Warning that the Obama health care reform bill mandates that seniors be given euthanasia counseling  Internet-circulated coupon offers free lunch from Wendy's  Electronic petition seeks to overturn Congressional vote granting Social Security benefits to illegal aliens 22

23 © 2009 Charles D. Knutson Hoaxes - Samples  The planet Mars will make a remarkably close approach to Earth in August 2009  Warning that cell phone numbers are about to be given to telemarketers  Warning about baby carrots made from deformed full-sized carrots which have been permeated with chlorine  A new Pepsi soda can design omits the words "under God" from the Pledge of Allegiance 23

24 © 2009 Charles D. Knutson Hoaxes - Cost  If all Internet users received a single hoax, spent 1 minute, and discarded  ~$40 million  If forwarded, spread is exponential  10 people per spread = 1,000,000 on the 6th hop  Spammers harvest addresses from hoax s 24

25 © 2009 Charles D. Knutson Hoaxes - What to do  Assume the is a hoax  Attempt to independently validate  If you can personally validate that the information is true...  Send it to select individuals with whom you have a relationship  And who don't mind receiving things  If you can't... DON'T FORWARD IT! 25

26 © 2009 Charles D. Knutson Hoaxes - Validating  Google  Search for specific phrases  See where that leads you  Check hoax tracking sites   Symantec  McAfee  Many others…  … but these are absolutely credible 26

27 © 2009 Charles D. Knutson Forwarding  What about forwarding other stuff?  Any that actively encourages you to send it to everyone is very bad form  forms a community or social network  Must respect the rules of that social network 27

28 © 2009 Charles D. Knutson Netiquette  Network etiquette  Rules of proper social behavior in the new digital society  Remember that users are human  Never say in an or online something you wouldn't say in person  Don't forward junk/hoax s 28

29 © 2009 Charles D. Knutson Netiquette  Limit all forwarding to people you personally know, and who you know want to receive it from you  The noise can be overwhelming!  Lurk before you leap  Understand the social rules of any new community before diving in and embarrassing yourself 29

30 © 2009 Charles D. Knutson Netiquette  Be careful about "Reply to All"  Accidentally spam a large group trying to respond to one user  ALL CAPS IS SHOUTING!!!!!!!!!!!  One exclamation point is enough!  Use subject lines appropriately  Helps users sort, find, prioritize 30

31 © 2009 Charles D. Knutson Netiquette  BCC for multiple senders  Otherwise you expose a large number of addresses to people who don't know each other  Include relevant portions of that you're responding to  Intersperse your comments 31

32 © 2009 Charles D. Knutson Netiquette  Remember that emotion is not fully conveyed via  Emoticons can help :) ;) :( :D... (HTML humor)  Non-emotion can be helpful!  Work through issues that would be too emotional face-to-face 32

33 © 2009 Charles D. Knutson Flaming  Flame:  Hostile or rude or communication  That would never happen in person  Flame bait:  Trolling for a fight in cyberspace  Flame war:  Challenge accepted, combat engaged  Generally very bad form 33

34 © 2009 Charles D. Knutson at work 34

35 © 2009 Charles D. Knutson Questions?  Internet Safety Podcast   Internet Safety Wiki  wiki.internetsafetypodcast.com Dr. Charles Knutson 35


Download ppt "© 2009 Charles D. Knutson Unclogging My Email: Spam, Phishing Attacks, Netiquette Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net."

Similar presentations


Ads by Google