ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Email Spam Works.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
Spam and . Spam Spam is unwanted usually meant to sell something to the recipient. If a business or organization with which you are affiliated.
Spyware and Spamware By Melissa Borri. Spamware… Spamware is unsolicited bulk that is designed to disguise the origin of any bulk it sends.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
Use the Internet to Find a Job Presented by Highland College Placement Office.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
AND SPAM BY OLUWATOBI BAKARE
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 4. Understanding the Internet’s Software Structure.
E-commerce--is Based on the use of internet-commerce is fasting becoming an alternative.
SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Listservs & Discussion Forums ICT Applications in School Libraries.
Response Class Projects Review. Summary of functionality Configuration Management Establish connection to the servers Establish connection to the.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing tactics.
A presentation about communicating electronically.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Windows Vista Configuration MCTS : Productivity Applications.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Internet Safety.  Ethics-moral standards or values  Netiquette-rules for proper online behavior.
Why your Road Runner Web Mail Bounced back?. As per the recent report more than 31 million s are bounced daily. They never reach to the destinations.
Deliverability and IP Warming
Computer Skills (1) .
Unit 3 Section 6.4: Internet Security
Learn how to protect yourself against common attacks
ITIS 1210 Introduction to Web-Based Information Systems
Fix Bigpond Error Code 550 Call for Help
Fix AOL Mail Error Code 554 Call for Help
Fix Yahoo Mail Box Error 550 Call for Help
3.06 Understand the use of direct marketing to attract attention and to build brand.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Social Engineering Humans are often the weakest point in security
Bell Ringer How can you protect your self online?
NETIQUETTE Pn. Jamilah Binti Yusof.
Presentation transcript:

ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works

 What to do about spam?  Unsolicited junk mail  “Good” spam  Buy their goods or services  Visit their Web sites  “Bad” spam  Viruses  Porn

How Spam Works  Where does “spam” come from?  Monty Python's Flying Circus Monty Python's Flying Circus Monty Python's Flying Circus  Why is spam a problem?  Uses resources  Slows down Internet  Takes up space  Takes time and effort to process

How Spam Works  Sending address can be forged  Angry responses go to wrong person  Hard to filter if using real person’s address as sender’s address  Senders can use other servers to send spam – pushing the costs off on others

How Spam Works  Spammers buy lists  Private companies  Send same message to tens of thousands of recipients at the same time  May relay messages from different servers to hide their identify or real location

How Spam Works  Should you respond to spam by asking to be removed from the list? NO! It verifies that your address is active!