Spam. Is spam a problem? Bandwidth hogging -> slower, costlier Discourages use of net (e-mail, e-commerce) Productivity -> loss of time and money Receiver.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
Introduction to the Anti-Spam Research Group (ASRG) Presented by Yakov Shafranovich, ASRG Co-chair NIST Spam Technology Workshop Gaithersburg, Maryland,
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
marketing. o is directly marketing a commercial message to a group of people using . o every sent to a potential or current customer.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
Deliverability How We Get You to the Inbox. +98 % Our Deliverability routinely ranks in the high 90s. There’s another way of saying this: We Get Your.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Methods for Stopping Spam James Lick
Netiquette Rules.
Public Policy Issues in the Communications and Infrastructure Services Policy area Geoff Huston APNIC June 2011.
Anonymity and SPAM The Good, the Bad and the Ugly!
1 CS 502: Computing Methods for Digital Libraries Lecture 26 Techniques of Access Management.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
The One-to-One eMessaging Company David S. Fowler Dir of Deliverability & ISP Relations How to Optimize Deliverability.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
Modeling the Internet and the Web School of Information and Computer Science University of California, Irvine 1 Modeling the Internet and the Web: Future.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Anti-Spam & Anti-Virus WiscMail Implementation University of Wisconsin - Madison CSG Workshop September 21, 2004.
Jonathan Reichardt. Internet Regulation Internet regulations censor data on the internet monitor IP addresses. The Internet Society wants to stop regulations.
Norman SecureSurf Protect your users when surfing the Internet.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
Christopher Boam Counsel for Internet & Global Ecommerce MCI, Inc., International Affairs on behalf of WITSA The World Information Technology and Services.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
Suing Spammers for Fun and Profit Serge Egelman. Background Over 50% of all mail Less than 200 people responsible.
1 The Business Case for DomainKeys Identified Mail.
31 March CMU Sustainable Computing Consortium, Tempe, Arizona Trust in Mobile & Context-Aware Computing: Legal Perspectives W. Scott Blackmer, Esq.
Wireless and Security CSCI 5857: Encoding and Encryption.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Africa, on the Road to Athens, Cairo september 2006 SPAM in Africa: Problems and Solutions? Adel GAALOUL, Président Directeur Général Agence Tunisienne.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Module 6 Planning and Deploying Messaging Security.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
Class Discussion Notes MKT April 10, 2001.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
SCAMS and SPAM John Corker Senior Associate. Oz NetLaw  National Internet legal practice of the Communications Law Centre.  Website at oznetlaw.net.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
RUCUS - IETF 71 1 Lessons Learned From IETF Antispam Work Jim Fenton.
Presentation will begin shortly. (Please Stand By)
Oversight Wc3.org –Standards body –Ensure interoperability with HTML –Growth of the web.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
E-commerce and the Law EC  E-commerce and the Law List     End Overview of E-commerce Law The Law Issues in EC’s Transactions.
Legal and Ethical Issues in E-Commerce
Misc. Security Items.
COMPUTER PRIVACY.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Electronic Communication and the Internet
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

Spam

Is spam a problem? Bandwidth hogging -> slower, costlier Discourages use of net ( , e-commerce) Productivity -> loss of time and money Receiver pays (but not fre , just in inconvenience), esp. in mobile wireless (Japan e.g.) Potential for fraud, esp. phishing/spoofing Missing legitimate messages (false positives) harvesting -> privacy Viruses: propagation of open relays, etc. (80% of spam through relays) Offensive content

Current Approaches Technical solutions: –Filtering at the client-side –Filtering of mail server-side IETF’s MARID: Authentication (started with SPF, which AOL championed; then MSFT introduced Caller ID for , for which it is holding patents) (but MARID shuttered on 9/22/04) Domain Keys: Authentication using keys (encryption) based upon domain names: Yahoo! (could add another level of security by using a certificate authority) Technically complementary. Think of it as two conversations: one at SMTP conversation level; one at the header level –Blacklisting (ISPs subscribe to a blacklist from a private organization) –ISPs slowing down passage of high-volume messages. –China:

Current Approaches Contract (ISP – User): –e.g., complete header information required –(bad for reputation, could get blacklisted, ISPs) Legislation –CAN-SPAM Act of 2003 –EU Directive International cooperation for enforcement –MoU between three countries to improve enforcement –Bilateral MoU approach (Australia-Korea) Norms –Failed almost completely: shame –User education Market-based solutions –Spam has an economic cost. “E-postage idea”: added transaction costs. (Computational speed costs approach.) –Bonded Sender

Future Approaches Standardized addresses

What are the priorities? Government enforcement –Criminal enforcement by FBI, US DOJ –Consumer protection US FTC, US DOJ (but see prestige in the anti-trust group) –But you have the int’l problem (do you need a TRIPS agreement analog?) Internally focused remedies –Invest in private security systems & shore up your own systems –Work with other companies to improve security, customer awareness Self-help remedies in the law –Trying the find the perpetrators & suing them Pressure ISPs to fix the problem Customer education (the only final answer?)