P12 r202t8 05-spam
-
Upload
phannarith-ou -
Category
Documents
-
view
96 -
download
0
Transcript of P12 r202t8 05-spam
Group: 5 Ya Putheara Nem Sopheak Chamroeun Daro Kheiv Chanthy Oeurn Sophearith
Lecturer : OU PHANNARITH
-‐Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email -‐Spam email may also include malware as scripts or other executable file attachments.
-‐Email spam has steadily grown since the early 1990s. Botnets, networks of virus-‐infected computers, are used to send about 80% of spam. Since the expense of the spam is borne mostly by the recipient, it is effectively postage due advertising. -‐spam was declared to be legal by the CAN-‐SPAM Act of 2003 provided the message adheres to certain specifications.
Spam has several definitions varying by source. -‐Unsolicited bulk email (UBE)—unsolicited email ,sent in large quantities. -‐Unsolicited commercial email (UCE)—this more restrictive definition is used by regulators whose mandate is to regulate commerce, such as the U.S. Federal Trade Commission
-‐According to information compiled by Commtouch Software Ltd., email spam for the first quarter of 2010 can be broken down as follows. EMail Spam by Topic
Appending: -‐If a marketer has one database containing names, addresses, and telephone numbers of prospective customers, they can pay to have their database matched against an external database containing email addresses.
-‐Image spam, or Image-‐based spam is an obfuscating method in which the text of the message is stored as a GIF or JPEG image and displayed in the email.
-‐Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, as well as the subject line.
-‐Backscatter is a side-‐effect of email spam, viruses and worms, where email servers receiving spam and other mail send bounce messages to an innocent party.
-‐Install spam filtering/blocking software. -‐Do not respond to suspicious emails . -‐Set up a disposable email address . -‐Create an email name that's tough to crack . -‐View emails in plain text . -‐Create a spam filter for your email . -‐Do not post links to email addresses on web sites -‐Watch out for those checked boxes -‐Report spam