Analysing Emails Michael Jones. Overview How email works Types of crimes associated with email Mitigations Countermeasures Michael Jones2Analsysing emails.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

Basic Communication on the Internet:
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Lecturer: Fadwa Tlaelan
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Unit 18 Data Security 1.
Internet Phishing Not the kind of Fishing you are used to.
Cyber X-Force-SMS alert system for threats.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
By Laura Trawin.
Spam Sonia Jahid University of Illinois Fall 2007.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Cyber Crimes.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Internet Security facilities for secure communication.
Reliability & Desirability of Data
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
CYBER CRIME.
Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Understanding Technology Crime Investigation for Managers.
CRIME - A crime is a wrongdoing classified by the state or Congress as a felony or misdemeanor. A crime is an offence against a public law. This word,
Dimensions of E – Commerce Security
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
SMTP / MIME Florin Zidaru.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Week 7 - Wednesday.  Web security – user side.
By Toby Reed.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
Done by… Hanoof Al-Khaldi Information Assurance
Identity theft vector of the electronic age
IT Security  .
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Overview What is Spoofing Types of Spoofing
UNIT 18 Data Security 1.
HOW DO I KEEP MY COMPUTER SAFE?
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems
Cybersecurity Simplified: Phishing
Presentation transcript:

Analysing s Michael Jones

Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s

How Works uses Simple Mail Transport Protocol (SMTP) – Normally linked to port 25 Text-based protocol – All commands are written in plaintext No verification or encryption – Of sender’s credentials – Of the integrity of the message For more information – Search for “smtp tutorial” Michael Jones3Analsysing s

Mail Forwarding A mail server might not have direct access to the server that owns the recipient’s account The mail is then forwarded to another server that might have that information The details of each server are added to the START of the message The originating location is thus the last one (in the header) – Providing no spoofing has gone on Michael JonesAnalsysing s4

-related Crime spoofing Sending malicious codes through bombing Sending threatening s Defamatory s frauds For more information: – Search for “ -related crime” or “ crime” Michael Jones5Analsysing s

Spoofing Techniques – Suggesting the comes from someone other than the actual sender – Typing incorrect sender details Example crime: spamming – Most on the Internet is spam – Spamming is not a criminal offence – Compromised or rogue servers used to mask the original location from which the s were sent – Most spam is motivated by money E.g., getting people to buy drugs – Almost all companies now employ spam filtering software Michael JonesAnalsysing s6

Sending Malicious Code via Code included in an attachment User opening attachment is interpreted by the software as implying that the user trusts the contents of the attachment Example: I Love You More sophisticated s might suggest that the attachment is a security patch that must be applied – E.g., sender spoofs the as being from a trusted security company Michael Jones7Analsysing s

Bombing Swamping someone’s account Direct technique – Sending lots of s – often with attachments – Fairly easily detected Indirect technique – Subscribe the user to many mailing lists – Difficult to prevent, and time-consuming to counteract Michael JonesAnalsysing s8

Sending Threatening s Example of cyber bullying – Prevalent in many schools (but methods are often linked to chat and SMS) Intentions: – Blackmail (e.g., by attaching or including apparently incriminating images or facts) E.g., for money or information – Social exclusion – by children Michael JonesAnalsysing s9

Defamatory s Defamatory = words intended to harm another Sent either to the person or to someone else Example: – Bill sends an to Emma suggesting it comes from John. The contains malicious information about Julie. Julie is being defamed, and the implication is that John is the perpetrator Michael JonesAnalsysing s10

Frauds Phishing – User is tricked into not only revealing their bank details, but into allowing the attacker to take money from their account How it works – Depends on the delays in the banking clearing system – Attacker appears to deposit a large amount of money in the victim’s account – Victim allows the attacker to take ‘commission’ for the transaction – A few days later, the bank clearing system catches up and finds that the deposit was fraudulent – The only valid transaction is the one FROM the victim’s account Michael JonesAnalsysing s11

Mitigations Mitigation – counteracting something that has already occurred mitigation is difficult – Direct bombing can be detected and countered – Attachments can be quarrantined Michael JonesAnalsysing s12

Countermeasures Techniques Spam detection and filtering – User education E.g., do not open attachments you do not trust – Hiding addresses E.g., not placing them directly on a web page – Hiding them using JavaScript – JavaScript puts the together from various fragments Spam software ‘harvests’ addresses by scanning web pages Michael JonesAnalsysing s13

Summary Most malicious activity is relatively harmless at the company or country level But not at the individual level Users need to see as indicative, not definitive Michael JonesAnalsysing s14