P12 r202t8 05-spam

12
Group: 5 Ya Putheara Nem Sopheak Chamroeun Daro Kheiv Chanthy Oeurn Sophearith Lecturer : OU PHANNARITH

Transcript of P12 r202t8 05-spam

Page 1: P12 r202t8 05-spam

Group: 5 Ya Putheara Nem Sopheak Chamroeun Daro Kheiv Chanthy Oeurn Sophearith

Lecturer  :  OU PHANNARITH

Page 2: P12 r202t8 05-spam

-­‐Email  spam,  also  known  as  junk  email  or  unsolicited  bulk  email  (UBE),  is  a  subset  of  electronic  spam  involving  nearly  identical  messages  sent  to  numerous  recipients  by  email  -­‐Spam  email  may  also  include  malware  as  scripts  or  other  executable  file  attachments.  

Page 3: P12 r202t8 05-spam

-­‐Email  spam  has  steadily  grown  since  the  early  1990s.  Botnets,  networks  of  virus-­‐infected  computers,  are  used  to  send  about  80%  of  spam.  Since  the  expense  of  the  spam  is  borne  mostly  by  the  recipient,  it  is  effectively  postage  due  advertising.  -­‐spam  was  declared  to  be  legal  by  the  CAN-­‐SPAM  Act  of  2003  provided  the  message  adheres  to  certain  specifications.  

Page 4: P12 r202t8 05-spam

Spam  has  several  definitions  varying  by  source.  -­‐Unsolicited   bulk   email   (UBE)—unsolicited   email   ,sent  in  large  quantities.  -­‐Unsolicited   commercial   email   (UCE)—this   more  restrictive   definition   is   used   by   regulators   whose  mandate  is  to  regulate  commerce,  such  as  the  U.S.  Federal  Trade  Commission  

Page 5: P12 r202t8 05-spam

-­‐According   to   information   compiled   by   Commtouch  Software   Ltd.,   email   spam   for   the   first   quarter   of   2010  can  be  broken  down  as  follows.  EMail  Spam  by  Topic  

Page 6: P12 r202t8 05-spam
Page 7: P12 r202t8 05-spam

Appending:  -­‐If   a   marketer   has   one   database   containing   names,  addresses,   and   telephone   numbers   of   prospective  customers,  they  can  pay  to  have  their  database  matched  against  an  external  database  containing  email  addresses.  

Page 8: P12 r202t8 05-spam

-­‐Image   spam,   or   Image-­‐based   spam   is   an   obfuscating  method  in  which  the  text  of  the  message  is  stored  as  a  GIF  or  JPEG  image  and  displayed  in  the  email.  

Page 9: P12 r202t8 05-spam

-­‐Blank   spam   is   spam   lacking   a  payload   advertisement.  Often  the  message  body  is  missing  altogether,  as  well  as  the  subject  line.  

Page 10: P12 r202t8 05-spam

-­‐Backscatter   is  a  side-­‐effect  of  email  spam,  viruses  and  worms,  where   email   servers   receiving   spam   and   other  mail  send  bounce  messages  to  an  innocent  party.  

Page 11: P12 r202t8 05-spam

-­‐Install  spam  filtering/blocking  software.  -­‐Do  not  respond  to  suspicious  emails  .  -­‐Set  up  a  disposable  email  address  .  -­‐Create  an  email  name  that's  tough  to  crack  .  -­‐View  emails  in  plain  text  .  -­‐Create  a  spam  filter  for  your  email  .  -­‐Do  not  post  links  to  email  addresses  on  web  sites    -­‐Watch  out  for  those  checked  boxes    -­‐Report  spam  

Page 12: P12 r202t8 05-spam