SlideShare a Scribd company logo
Spam
The slides was done by
Gabrielė Bautonytė
What is spam ?
 Spam is everywhere. As Internet-based
communication technology evolves so do the
methods unscrupulous individuals use to send
you advertisements.
 When you hear the word spam, your
immediate thoughts go to the more well-
known and common form of spam: email
spam.
What is spam ?
 However, other types of spam are found in a
variety of Internet communication mediums
such as instant messaging, discussion
boards, mobile phones with text messaging,
newsgroups, Internet telephony, blogs —
basically any device or client that provides a
means for communications.
All about email spam
 While many Internet users have resigned
themselves to the fact that email spam is here
to stay, there is nothing more annoying than
logging in to check your email and
downloading or sifting through tens or
hundreds (or even thousands) of unwanted
email advertising for some product sent
directly to your email address.
How SPAM looks
All about email spam
 Email spam numbers have been on the rise
because e-mail spam is a cheap way to
garner a few sales. For the solicitor, the costs
associated with spamming are minimal. All
they need is time and enough money for an
Internet connection and lists of e-mail
addresses.
5 Best Practices to Combat Email
Spam
 Currently, there is no way to completely stop
spam. The good news, however, is that individuals
can take proactive steps to limit the number of
incoming spam emails to save time, frustrations
and money.
 1. Keep Your Email Address More Private;
 2. Choose More Complex Email Address;
 3. Don't Click Links in Spam Email;
 4. Use a Good Email Filter;
 5. Remember the Virus Scanner.
Keep your email address more
private
 To avoid email address harvesting practices,
it's important to not post (in text) your email
address in public Internet chat rooms, on any
Web site, newsgroup, guestbook or blogs to
which you post.
Choose more complex email
address
 Some spammers basically attack mail servers
and use a method called a dictionary attack to
get their junk mail sent out. Basically, the
spam is sent to every combination of letters
and common names at an ISP. In this
scenario, spam is more likely to get through to
a common, short email address like "mary
@insertdomainname.com" than it would
"mary_washinger @insertdomainname.com".
Don't click links in spam email
 Even if the links reads "click to unsubscribe,"
if that link appears within a spam message,
chances are your click to unsubscribe is used
solely for the purpose of informing the
spammer that your email address is valid and
you may end up on even more spam lists.
Use a good email filter
 The best proactive step you can take to limit
spam mail in your in box is to use a good
email filter. There are many types of filters
available today that will block or filter email
based its content, header or even language.
Most email programs will allow you to define
your own criteria for blocking in addition to
these filters.
Remember the virus scanner
 The golden rule for any spam is to never open
or accept files from people you do not know.
Spam is rife with worms, Trojans, and viruses
that can be attached as what seems to be
legitimate files in email messages. While the
above best practices can help with lowering
the number of spam emails you receive, only
a real-time virus scanner can help with
removing the risks to your system security.
All about Spam over Instant
messaging (SPIM)
 Spim, is a type of spam that uses IM platforms
as the transport medium. Users of different
public IM systems, who use public profiles are
quite likely to receive unsolicited advertising
messages from spammers. Similar to e-mail
spam, spim messages are advertisements
and will usually contain an embedded
hyperlink link to visit the Web site this
individual or bot is marketing.
How SPIM looks
Comparing Spam and Spim
 Compared to spam, spim is less common, but
it is often thought to be a bigger annoyance
and intrusion. When you check your email,
you can quickly scan the incoming messages
and read only those you know are legitimate,
leaving the spam for a later time (or for a
mass delete).
Comparing Spam and Spim
 Spim, however, is sent through a real-time
communication platform, which means you
have to deal with spim in real-time as well.
You have to stop what you are doing and deal
with the spim as the IM window pops up.
Spim is also considered to be more of a risk
than e-mail spam because IM users expect to
be on the receiving end of a message from a
user in their buddy list — not a spimmer.
IM Spam (spim): 3 Best Practices
For Individuals
 If you're familiar with combating e-mail spam,
you'll have a head start in your fight against
spim. Again, the golden rule to protection and
security is to never open or accept files from
people you do not know!
 1. Private access is key;
 2. Even buddies can be harmful;
 3. Remember the virus scanner.
Private access is key
 The best way to avoid spim is to never open
or respond to a message from a person you
do not know. If you make your IM user name
and contact details public, just like with e-mail
spam, you are providing spimmers with the
information they need to contact you. Keep
your IM profile and username off public
directories.
Even buddies can be harmful
 To avoid security risks, use extreme caution in
opening any file or link in an IM — even if you
do know the user who is sending it. The
nature of Trojans and worms that spread
through IM channels means your buddy's
system could be infected, and the message
you receive may simply be the result of a
worm replicating on its own through their
contact list.
Remember the virus scanner
 The golden rule for any spam is to never open
or accept files from people you do not know.
Spam is rife with worms, Trojans, and viruses
which, in IM can seem like a harmless
message from a person in your contact list. A
virus scanner will go a long way in helping to
protect your system from malicious spim.
All about Spam over internet
telephony (SPIT)
 According to Internet and technical
publications, spit is already an acronym.
However, when the acronym was created in
October 2004, there wasn't a single reported
cases of spit. Much like spam and spim, it's
believed that as internet telephony becomes
more popular with consumers, spit is sure to
follow.
How SPIT looks
All about Spam over internet
telephony (SPIT)
 Similar to spam and spim, spit offers
spammers a low-cost alternative to unsolicited
marketing. Mass marketing using automated
voice messages is accomplished literally with
the push of a button. The attraction to
spammers, of course, is that spit can be fully
automated and is certainly cheaper than
staffing a call center with people to make
voice calls.
Internet Telephony Spam (spit):
Best Practices For Individuals
 Understand the Risk: While spit is not nearly
as common as spam or spim, it's important to
identify the potential risk to your network and
educate yourself about what is happening in
terms of trends. Being aware that the problem
exists on a small scale now will help you if
and when it becomes a common spam tactic.
Interesting facts about spam
 Spam accounts for 14.5 billion messages
globally per day. In other words, spam makes
up 45% of all emails. Some research
companies estimate that spam email makes
up an even greater portion of global emails,
some 73% in fact. The United States is the
number one generator of spam email, with
Korea clocking in as the second largest
contributor of unwanted email.
Interesting facts about spam
 The most prevalent type of spam is
advertising-related email; this type of spam
accounts for approximately 36% of all spam
messages. The second most common
category of spam is adult-related in subject
and makes up roughly 31.7% of all spam.
Unwanted emails related to financial matters
is the third most popular form of spam, at
26.5%.
The conclusion
 The Internet is a wonderful resource that can
help you find out nearly anything you want to
know. It’s also home to the same types of
people who inhabit the real world: thieves,
con men, liars, cheats, exploiters and other
ruffians.
Thank you for your time 

More Related Content

PPTX
Cybersecurity Awareness for employees.pptx
PPTX
Email Security Awareness
PPTX
Secure communication
PPTX
Network security and firewalls
PPTX
Network-security-ppt.pptx...............
PDF
100+ Cyber Security Interview Questions and Answers in 2022
PPTX
Email hacking
PPT
Internet Security
Cybersecurity Awareness for employees.pptx
Email Security Awareness
Secure communication
Network security and firewalls
Network-security-ppt.pptx...............
100+ Cyber Security Interview Questions and Answers in 2022
Email hacking
Internet Security

What's hot (20)

PPTX
PPTX
Security threats
PPT
Network Security
PPSX
Cyber crime
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Encryption and Decryption
PPTX
Security threats and safety measures
PPT
Types of attacks and threads
PPT
Basics of E-Mail
PPT
PPTX
Intrusion detection
 
PPT
Network Security Threats and Solutions
PPTX
Network Security and Firewall
PPTX
Network security
PPTX
Internet and intranet
PPT
Spamming and Spam Filtering
PPTX
Social engineering
PPT
What is SPAM?
PPT
PPTX
Cyber Spamming & its Types
Security threats
Network Security
Cyber crime
Network security (vulnerabilities, threats, and attacks)
Encryption and Decryption
Security threats and safety measures
Types of attacks and threads
Basics of E-Mail
Intrusion detection
 
Network Security Threats and Solutions
Network Security and Firewall
Network security
Internet and intranet
Spamming and Spam Filtering
Social engineering
What is SPAM?
Cyber Spamming & its Types
Ad

Similar to Spam (20)

PPTX
Spamming for ecommerce student of college
PPT
Internet Safety: I
PDF
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
PPT
Spamming Ict
PPTX
Spamming as cyber crime
PPTX
virusesssssssssssssssssssssssssssss.pptx
PPTX
Spam Email: 8 Dos and Dont's
PPT
Technology And Ethics Spam
PPTX
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
PDF
Fighting spam
PPT
PPTX
Internet Safety
PPTX
Web spam
PPTX
Internet Safety
PPT
Spam and Anti-spam - Sudipta Bhattacharya
PPT
Electronic mail and online safety (Sep 17, 2008) (beginner)
DOCX
Final paper
PDF
How to Protect Your PC from Malware, Ransomware, Virus
PPTX
3 Best Practices for Email Marketing
PDF
Computer Security Guide to Pc Security
Spamming for ecommerce student of college
Internet Safety: I
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
Spamming Ict
Spamming as cyber crime
virusesssssssssssssssssssssssssssss.pptx
Spam Email: 8 Dos and Dont's
Technology And Ethics Spam
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
Fighting spam
Internet Safety
Web spam
Internet Safety
Spam and Anti-spam - Sudipta Bhattacharya
Electronic mail and online safety (Sep 17, 2008) (beginner)
Final paper
How to Protect Your PC from Malware, Ransomware, Virus
3 Best Practices for Email Marketing
Computer Security Guide to Pc Security
Ad

More from Apostolos Syropoulos (20)

PDF
A Presentation of Braga. It was made by students of school
PPTX
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
PPTX
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
PDF
A gentle introduction to Artificial Intelligence
PPTX
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
PPTX
Το Ορφανοτροφείο Θηλέων Ξάνθης
PPTX
Το Αρχαιολογικό Μουσείο Αβδήρων
PPTX
Ταφικά έθιμα στα αρχαία Άβδηρα
PPTX
Το ορφανοτροφείο της Ξάνθης
PPTX
Μικρασιατική κατατστροφή - Μέρος 3
PPTX
Μικρασιατική κατατστροφή - Μέρος 2
PPTX
Αφιέρωμα στη Μικρά Ασία
PPTX
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
PDF
How to Convert Units of Measure
PDF
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
PDF
Inflected Forms of Nouns and Adjectives
PDF
Learning Simple Phrases in Greek
PDF
Computational Thinking and...the Greek Alphabet
PPTX
Το Αποτύπωμα του 1821 στον Τόπο μου
PDF
Παγκόσμια ημέρα της σταθεράς π=3,14...
A Presentation of Braga. It was made by students of school
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
A gentle introduction to Artificial Intelligence
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Αρχαιολογικό Μουσείο Αβδήρων
Ταφικά έθιμα στα αρχαία Άβδηρα
Το ορφανοτροφείο της Ξάνθης
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 2
Αφιέρωμα στη Μικρά Ασία
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
How to Convert Units of Measure
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Inflected Forms of Nouns and Adjectives
Learning Simple Phrases in Greek
Computational Thinking and...the Greek Alphabet
Το Αποτύπωμα του 1821 στον Τόπο μου
Παγκόσμια ημέρα της σταθεράς π=3,14...

Recently uploaded (20)

PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
artificial intelligence overview of it and more
DOCX
Unit-3 cyber security network security of internet system
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Digital Literacy And Online Safety on internet
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Introduction to Information and Communication Technology
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
SAP Ariba Sourcing PPT for learning material
Triggering QUIC, presented by Geoff Huston at IETF 123
Unit-1 introduction to cyber security discuss about how to secure a system
An introduction to the IFRS (ISSB) Stndards.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
QR Codes Qr codecodecodecodecocodedecodecode
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
artificial intelligence overview of it and more
Unit-3 cyber security network security of internet system
Job_Card_System_Styled_lorem_ipsum_.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
Digital Literacy And Online Safety on internet
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
SASE Traffic Flow - ZTNA Connector-1.pdf
Sims 4 Historia para lo sims 4 para jugar
522797556-Unit-2-Temperature-measurement-1-1.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Design_with_Watersergyerge45hrbgre4top (1).ppt
Introduction to Information and Communication Technology

Spam

  • 1. Spam The slides was done by Gabrielė Bautonytė
  • 2. What is spam ?  Spam is everywhere. As Internet-based communication technology evolves so do the methods unscrupulous individuals use to send you advertisements.  When you hear the word spam, your immediate thoughts go to the more well- known and common form of spam: email spam.
  • 3. What is spam ?  However, other types of spam are found in a variety of Internet communication mediums such as instant messaging, discussion boards, mobile phones with text messaging, newsgroups, Internet telephony, blogs — basically any device or client that provides a means for communications.
  • 4. All about email spam  While many Internet users have resigned themselves to the fact that email spam is here to stay, there is nothing more annoying than logging in to check your email and downloading or sifting through tens or hundreds (or even thousands) of unwanted email advertising for some product sent directly to your email address.
  • 6. All about email spam  Email spam numbers have been on the rise because e-mail spam is a cheap way to garner a few sales. For the solicitor, the costs associated with spamming are minimal. All they need is time and enough money for an Internet connection and lists of e-mail addresses.
  • 7. 5 Best Practices to Combat Email Spam  Currently, there is no way to completely stop spam. The good news, however, is that individuals can take proactive steps to limit the number of incoming spam emails to save time, frustrations and money.  1. Keep Your Email Address More Private;  2. Choose More Complex Email Address;  3. Don't Click Links in Spam Email;  4. Use a Good Email Filter;  5. Remember the Virus Scanner.
  • 8. Keep your email address more private  To avoid email address harvesting practices, it's important to not post (in text) your email address in public Internet chat rooms, on any Web site, newsgroup, guestbook or blogs to which you post.
  • 9. Choose more complex email address  Some spammers basically attack mail servers and use a method called a dictionary attack to get their junk mail sent out. Basically, the spam is sent to every combination of letters and common names at an ISP. In this scenario, spam is more likely to get through to a common, short email address like "mary @insertdomainname.com" than it would "mary_washinger @insertdomainname.com".
  • 10. Don't click links in spam email  Even if the links reads "click to unsubscribe," if that link appears within a spam message, chances are your click to unsubscribe is used solely for the purpose of informing the spammer that your email address is valid and you may end up on even more spam lists.
  • 11. Use a good email filter  The best proactive step you can take to limit spam mail in your in box is to use a good email filter. There are many types of filters available today that will block or filter email based its content, header or even language. Most email programs will allow you to define your own criteria for blocking in addition to these filters.
  • 12. Remember the virus scanner  The golden rule for any spam is to never open or accept files from people you do not know. Spam is rife with worms, Trojans, and viruses that can be attached as what seems to be legitimate files in email messages. While the above best practices can help with lowering the number of spam emails you receive, only a real-time virus scanner can help with removing the risks to your system security.
  • 13. All about Spam over Instant messaging (SPIM)  Spim, is a type of spam that uses IM platforms as the transport medium. Users of different public IM systems, who use public profiles are quite likely to receive unsolicited advertising messages from spammers. Similar to e-mail spam, spim messages are advertisements and will usually contain an embedded hyperlink link to visit the Web site this individual or bot is marketing.
  • 15. Comparing Spam and Spim  Compared to spam, spim is less common, but it is often thought to be a bigger annoyance and intrusion. When you check your email, you can quickly scan the incoming messages and read only those you know are legitimate, leaving the spam for a later time (or for a mass delete).
  • 16. Comparing Spam and Spim  Spim, however, is sent through a real-time communication platform, which means you have to deal with spim in real-time as well. You have to stop what you are doing and deal with the spim as the IM window pops up. Spim is also considered to be more of a risk than e-mail spam because IM users expect to be on the receiving end of a message from a user in their buddy list — not a spimmer.
  • 17. IM Spam (spim): 3 Best Practices For Individuals  If you're familiar with combating e-mail spam, you'll have a head start in your fight against spim. Again, the golden rule to protection and security is to never open or accept files from people you do not know!  1. Private access is key;  2. Even buddies can be harmful;  3. Remember the virus scanner.
  • 18. Private access is key  The best way to avoid spim is to never open or respond to a message from a person you do not know. If you make your IM user name and contact details public, just like with e-mail spam, you are providing spimmers with the information they need to contact you. Keep your IM profile and username off public directories.
  • 19. Even buddies can be harmful  To avoid security risks, use extreme caution in opening any file or link in an IM — even if you do know the user who is sending it. The nature of Trojans and worms that spread through IM channels means your buddy's system could be infected, and the message you receive may simply be the result of a worm replicating on its own through their contact list.
  • 20. Remember the virus scanner  The golden rule for any spam is to never open or accept files from people you do not know. Spam is rife with worms, Trojans, and viruses which, in IM can seem like a harmless message from a person in your contact list. A virus scanner will go a long way in helping to protect your system from malicious spim.
  • 21. All about Spam over internet telephony (SPIT)  According to Internet and technical publications, spit is already an acronym. However, when the acronym was created in October 2004, there wasn't a single reported cases of spit. Much like spam and spim, it's believed that as internet telephony becomes more popular with consumers, spit is sure to follow.
  • 23. All about Spam over internet telephony (SPIT)  Similar to spam and spim, spit offers spammers a low-cost alternative to unsolicited marketing. Mass marketing using automated voice messages is accomplished literally with the push of a button. The attraction to spammers, of course, is that spit can be fully automated and is certainly cheaper than staffing a call center with people to make voice calls.
  • 24. Internet Telephony Spam (spit): Best Practices For Individuals  Understand the Risk: While spit is not nearly as common as spam or spim, it's important to identify the potential risk to your network and educate yourself about what is happening in terms of trends. Being aware that the problem exists on a small scale now will help you if and when it becomes a common spam tactic.
  • 25. Interesting facts about spam  Spam accounts for 14.5 billion messages globally per day. In other words, spam makes up 45% of all emails. Some research companies estimate that spam email makes up an even greater portion of global emails, some 73% in fact. The United States is the number one generator of spam email, with Korea clocking in as the second largest contributor of unwanted email.
  • 26. Interesting facts about spam  The most prevalent type of spam is advertising-related email; this type of spam accounts for approximately 36% of all spam messages. The second most common category of spam is adult-related in subject and makes up roughly 31.7% of all spam. Unwanted emails related to financial matters is the third most popular form of spam, at 26.5%.
  • 27. The conclusion  The Internet is a wonderful resource that can help you find out nearly anything you want to know. It’s also home to the same types of people who inhabit the real world: thieves, con men, liars, cheats, exploiters and other ruffians.
  • 28. Thank you for your time 