The Internet and Access to Information Why is it so difficult to eliminate SPAM? By:Juan C. Vargas Computer Science 450.

Slides:



Advertisements
Similar presentations
Eloqua Providing Industry-Leading Management Tools.
Advertisements

Basic Communication on the Internet:
Thank you to IT Training at Indiana University Computer Malware.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Securing Gateways Identifying/Defending Attacks A. Padgett Peterson, P.E., CISSP Corporate Information Protection Lockheed Martin Corporation Orlando,
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
Sieve Loops Tony Hansen
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
Security Issues: Phishing, Pharming, and Spam
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Home PC Security What PC Users and Law Enforcement Should Know Printing with “Notes” enabled with provide a script for each slide Bob Samson 11/20/2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Outsourcing Golf Course Website - -Marketing - E-commerce.
Internet Security facilities for secure communication.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Digital Citizenship. Digital Citizen  A person using IT in order to engage in society, politics, and government expectations.  “Those who use the internet.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Malicious Attacks By Katya, Grace, Lachlan, Sairus and Eric!
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
A Technical Approach to Minimizing Spam Mallory J. Paine.
Introduction to Microsoft SharePoint AC.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
The traditional ing process. Sender Receiver ISP Server.
Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
What is Spam? d min.
Name : ALya Mohammed ID: H
Malicious Spam: The Impact of Prosecuting Spammers on Fraud and Malware Contained in Spam Alex Kigerl, PhD Washington State University
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
FUSE MAIL. ABOUT FUSE MAIL Fuse mail provides the business around the world to communicate with confidence. Use cloud based services to provide secure.
Malware attack hardening using Software Restriction Policies
Game of P0WN3Ds: Winter Has Come
Outsourcing Golf Course Website - -Marketing - E-commerce
Norton Antivirus Password Not Working Norton technical support phone number
Norton Antivirus Technical Support Number Norton toll free number
What is it? Why do I keep getting from Barracuda? SPAM.
Net Report Proxy Dashboard Summary
ethical issues in business
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presentation transcript:

The Internet and Access to Information Why is it so difficult to eliminate SPAM? By:Juan C. Vargas Computer Science 450

Spam has become a major problem in our society and despite many attempts, no perfect solution has been found. Internet Spam Percentage Source: Symantec

Regions of SPAM Origin ◦United States 29% ◦Turkey 8% ◦Russia 7% ◦South Korea 4% ◦China 4% ◦India 4% ◦Brazil 3% Malware detected in Messages

Measures Taken Against SPAM Top Malware detected (2008) ◦Trojan Horse 13.4% ◦Downloader 11.8% ◦Infostealer 11.1% Law The CAN-SPAM Act of 2003 Unsubscribe Compliance Content Compliance Sending Behavior Compliance Content is Exempt if it consists of: Religious Messages Political messages National Security Messages

The CAN-SPAM Act is commonly referred to by anti-spam activists as the YOU-CAN-SPAM Act because: ◦The bill does not require ers to get permission before they send marketing messages. ◦It also prevents states from enacting stronger anti-spam protections. ◦The Act has been largely unenforced  About 1% of SPAM complies with CAN-SPAM ACT

Software ◦SPAM Filters and Blockers  Examine the header and content of the message, and look for various features ◦ Where the message came from ◦ What software sent the message ◦ What the message looks like  Extensions linked to SPAM ◦ ade adp app asd asf asx bas bat chm cmd com cpl crt dll exe fxp hlp hta hto inf ini ins isp jse lib lnk mdb mde msc msi msp mst ocx pcd pif prg rar reg scr sct sh shb shs sys url vb vbe vbs vcs vxd wmd wms wmz wsc wsf wsh

Blacklisting ◦Keeps on growing and changing ◦Causes problems when a Legit ISPs get blacklisted  s are not received on time or not receive at all until problem is resolved. Whitelisting User has to allow valid senders. (Time Consuming) Keep updating white list every time a valid sender changes it address Problem: Zombie Computers

Zombie Computers ◦In September 2008, there was a 101 percent increase in the number of active zombie computers sending spam. ◦Top countries hosting zombie machines  Turkey 12%  Brazil 9%  Russia 8%  India 6%  United States 6%

Conclusion Because of Zombie Computers maintaining a Blacklist or white list will not solve the problem of SPAM CAN-SPAM ACT has many flaws and without the compromise of all countries around the world it is useless.