SlideShare a Scribd company logo
1 of 20
Electronic mail &Electronic mail &
control of spamcontrol of spam
11
Outlining theOutlining the
presentationpresentation
Section 1: PresentationSection 1: Presentation
Section 2: Project VideoSection 2: Project Video
Section 3: Q & ASection 3: Q & A
22
So what is spam?So what is spam?
• Email spamEmail spam
““Irrelevant or unsolicited messages sentIrrelevant or unsolicited messages sent
over the Internet, typically to largeover the Internet, typically to large
numbers of users, for the purposes ofnumbers of users, for the purposes of
advertising, phishing, spreadingadvertising, phishing, spreading
malware, etc.”malware, etc.”
• Spam (Food)Spam (Food)
““Spam is a canned pre-cooked meatSpam is a canned pre-cooked meat
product made by the Hormel Foodsproduct made by the Hormel Foods
Corporation, first introduced in 1937.”Corporation, first introduced in 1937.”
33
The evolution of spamThe evolution of spam
44
55
66
77
88
99
Fighting spamFighting spam
1010
Fighting spamFighting spam
DetectionDetection
• Checking words: false positivesChecking words: false positives
• DNS Blacklists (ex. SpamCop,DNS Blacklists (ex. SpamCop,
Spamhaus project)Spamhaus project)
End-user techniquesEnd-user techniques
• Avoid responding to spamAvoid responding to spam
• DiscretionDiscretion
• Posting anonymouslyPosting anonymously
• Disable HTML in emailDisable HTML in email
• Reporting spamReporting spam
1111
Fighting spamFighting spam
1212
Automated techniquesAutomated techniques
• Authentication and reputationAuthentication and reputation
• Challenge/response systemsChallenge/response systems
• Checksum-based filteringChecksum-based filtering
• Country-based filteringCountry-based filtering
• DNS-based blacklistsDNS-based blacklists
• Enforcing RFC standardsEnforcing RFC standards
• Outbound spam protectionOutbound spam protection
• Confirmed opt-in for mailing listsConfirmed opt-in for mailing lists
• Sender-supported whitelists and tagsSender-supported whitelists and tags
1313
Social Engineering & SpamSocial Engineering & Spam
1414
1515
1616
1717
Lets look at the trailer…Lets look at the trailer…
1818
1919
QuestionsQuestions
&&
AnswersAnswers
For more infoFor more info
Share us on youtube | Screencast and ProjectShare us on youtube | Screencast and Project
VideoVideo
http://www.youtube.com/channel/UCh9QVw6gMKfWgtuTMFIr3WA/vidhttp://www.youtube.com/channel/UCh9QVw6gMKfWgtuTMFIr3WA/vid
eoseos
Presentation | KeynotePresentation | Keynote
http://www.slideshare.net/AJR_DIT/projfe1-electronic-mail-and-control-http://www.slideshare.net/AJR_DIT/projfe1-electronic-mail-and-control-
of-spamof-spam
Wiki | Written ReportWiki | Written Report
https://webdevprojfe1.wikispaces.com/https://webdevprojfe1.wikispaces.com/
2020

More Related Content

Viewers also liked

Introduction to e commerce
Introduction to e commerceIntroduction to e commerce
Introduction to e commerce
Utomo Prawiro
 

Viewers also liked (6)

Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Introduction to e commerce
Introduction to e commerceIntroduction to e commerce
Introduction to e commerce
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 

Similar to Proj.fe1 Electronic mail and control of spam (6)

Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
 
Watch out!
Watch out!Watch out!
Watch out!
 
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
 
Anomaly-based Spam Filtering - SECRYPT 2011
Anomaly-based Spam Filtering - SECRYPT 2011Anomaly-based Spam Filtering - SECRYPT 2011
Anomaly-based Spam Filtering - SECRYPT 2011
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Proj.fe1 Electronic mail and control of spam

  • 1. Electronic mail &Electronic mail & control of spamcontrol of spam 11
  • 2. Outlining theOutlining the presentationpresentation Section 1: PresentationSection 1: Presentation Section 2: Project VideoSection 2: Project Video Section 3: Q & ASection 3: Q & A 22
  • 3. So what is spam?So what is spam? • Email spamEmail spam ““Irrelevant or unsolicited messages sentIrrelevant or unsolicited messages sent over the Internet, typically to largeover the Internet, typically to large numbers of users, for the purposes ofnumbers of users, for the purposes of advertising, phishing, spreadingadvertising, phishing, spreading malware, etc.”malware, etc.” • Spam (Food)Spam (Food) ““Spam is a canned pre-cooked meatSpam is a canned pre-cooked meat product made by the Hormel Foodsproduct made by the Hormel Foods Corporation, first introduced in 1937.”Corporation, first introduced in 1937.” 33
  • 4. The evolution of spamThe evolution of spam 44
  • 5. 55
  • 6. 66
  • 7. 77
  • 8. 88
  • 9. 99
  • 11. Fighting spamFighting spam DetectionDetection • Checking words: false positivesChecking words: false positives • DNS Blacklists (ex. SpamCop,DNS Blacklists (ex. SpamCop, Spamhaus project)Spamhaus project) End-user techniquesEnd-user techniques • Avoid responding to spamAvoid responding to spam • DiscretionDiscretion • Posting anonymouslyPosting anonymously • Disable HTML in emailDisable HTML in email • Reporting spamReporting spam 1111
  • 12. Fighting spamFighting spam 1212 Automated techniquesAutomated techniques • Authentication and reputationAuthentication and reputation • Challenge/response systemsChallenge/response systems • Checksum-based filteringChecksum-based filtering • Country-based filteringCountry-based filtering • DNS-based blacklistsDNS-based blacklists • Enforcing RFC standardsEnforcing RFC standards • Outbound spam protectionOutbound spam protection • Confirmed opt-in for mailing listsConfirmed opt-in for mailing lists • Sender-supported whitelists and tagsSender-supported whitelists and tags
  • 13. 1313 Social Engineering & SpamSocial Engineering & Spam
  • 14. 1414
  • 15. 1515
  • 16. 1616
  • 17. 1717
  • 18. Lets look at the trailer…Lets look at the trailer… 1818
  • 20. For more infoFor more info Share us on youtube | Screencast and ProjectShare us on youtube | Screencast and Project VideoVideo http://www.youtube.com/channel/UCh9QVw6gMKfWgtuTMFIr3WA/vidhttp://www.youtube.com/channel/UCh9QVw6gMKfWgtuTMFIr3WA/vid eoseos Presentation | KeynotePresentation | Keynote http://www.slideshare.net/AJR_DIT/projfe1-electronic-mail-and-control-http://www.slideshare.net/AJR_DIT/projfe1-electronic-mail-and-control- of-spamof-spam Wiki | Written ReportWiki | Written Report https://webdevprojfe1.wikispaces.com/https://webdevprojfe1.wikispaces.com/ 2020

Editor's Notes

  1. Hi there, you are more than welcome here today. My name is Jamie Sullivan and i’m here with my colleges Rick and Alan. Today we will be providing you with a presentation on electronic mail and control of spam.
  2. So to outline this presentation, well it is sectioned into three individual pieces the presentation itself a project video and finally a q + a. section one is in relation to the fundamentals of electronic mail and control of spamming this will hopefully educated you all on spam, hacking and protection section two is out project video we put together and the final segment is the q and a for any questions you may have.
  3. During our research we discovered that are two types of spam out there. You have your food spam and email spam which is actually the one we will cover in this report. So basically email spam is just unsolicited “junk” email
  4. Spam evolved quick a lot since the neolithic times Writing on the walls left by the cavemen on modern days we have electronic spam and non-electronic spam
  5. The arpanet (now modern internet) was created during the cold war period to survive a nuclear attack. Since its a decentralised network you cannot shut it down and that is why spammers use it to relay messages
  6. today we have modern spam based on email, internet messaging
  7. Mobile devices, social media and online gaming platforms
  8. some advice if you dont want to be a spammer just follow these recommendations
  9. Fighting spam: Detection, end user techniques and automated techniques
  10. cisco, microsoft, facebook, google among others have these datacenter with servers that automate the tasks and make our life easier to give you an example
  11. is spam a serious problem? we like to think so… but don’t take our word for it ask cisco, symantec, google and many others that constantly produce reports about the threat
  12. Most posts contain gps location
  13. Social engineering
  14. hackers target personal info and sell databases to criminals
  15. - cybercriminals use social engineering such has phishing - they use this info to hack computers and gather botnets - they use botnets to attack sites with DDnS
  16. We divided this presentation in 3 sections