Spam, Spyware, and Security Presentation by Ryan Southwick
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Spam, Spyware, and Security Presentation by Ryan Southwick

on

  • 388 views

 

Statistics

Views

Total Views
388
Views on SlideShare
388
Embed Views
0

Actions

Likes
0
Downloads
5
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Spam, Spyware, and Security Presentation by Ryan Southwick Presentation Transcript

  • 1. Spam, Spyware, and Security Presentation by Ryan Southwick
  • 2. E-mail Spam
    • Not Spam
      • Unsolicited Legitimate E-mail
      • Job Inquiries, First Contact
      • Bulk Legitimate E-mail
      • Newsletters, Discussion Lists
    • Spam (UBE)
      • Unsolicited and Bulk
        • UCE: Unsolicited Commercial E-mail
          • Viagra
        • Phishing / Scam
          • Nigerian
  • 3. Spam Statistics
      • Chronology
        • 1978 - An e-mail spam is sent to 600 addresses.
        • 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people.
        • 2005 - (June) 30 billion per day
        • 2006 - (June) 55 billion per day
        • 2006 - (December) 85 billion per day
        • 2007 - (February) 90 billion per day
      • 80% created by fewer than 200 organizations
      • 80% sent from virus infected computers and botnets
      • United States, China, South Korea top spam sending nations
  • 4. How do you get Spam?
    • Harvesting of E-mail Addresses
      • Chat rooms, Websites, Newsgroups
      • Viruses that target Address Book
      • Companies selling User Information
      • Database Exploits / Hacks
      • Search Engines
      • Bots
      • Using Public Terminals
      • Random Generation
  • 5. Prevention
    • Behavioral Tips
      • Use a “Spam” E-mail Account
        • Use for spam account for: Newsletters, Registration, Questionnaires
        • Use primary account for: Event tickets, personal friends, and trusted sites like Amazon and Ebay
      • Read fine print
      • Sign out after using public computers
      • Use BCC function when sending out e-mails
      • Don’t hit “Reply All”
      • When Forwarding messages, remove all other people’s e-mail addresses
      • Don’t Unsubscribe to newsletters you never subscribed to
    • Software
      • Updates
        • Operating System
        • Applications
        • Security Software
          • Scan Incoming Messages
          • Scan Attachments
  • 6. Spam Filtering Specifics
    • ISP / E-mail Provider Techniques
      • Greylist
      • Whitelist
      • Blacklist
      • 3 rd Party Spam Filtering Services
        • Postini
      • Spam Assassin
    • Spam Filtering Clients
  • 7. Spyware and Viruses
    • Spyware / Malware
      • Collect Data, Statistical Information
      • Fraudulent Products
      • Toolbars
      • How are they Installed?
        • Active-x controls
        • Manually via virus infection
    • Viruses
      • Good portion contracted through e-mail, peer to peer, social networking sites
      • Propogate though Operating System and application security holes
      • Trojan
      • Botnet
  • 8. What do they have to gain?
    • Statistical Information
    • Exploit Personal Information
    • Money
  • 9. Prevention
    • Firewall
      • Hardware
        • NAT: masks computer behind firewall
      • Software
        • Monitors incoming and outgoing traffic, user prompting
    • Anti-virus: Active file monitoring
    • Anti-spyware: Active file monitoring and immunization
    • Suites: All-in-one
    • Browsers (Windows)
      • Firefox, Opera, Safari
    • No File Sharing Applications
  • 10. Removal Recommendations
    • Install and Update Software
    • Remove Temp Files (Ccleaner)
    • Clear startup items (Msconfig)
    • Scan in Safe Mode
    • Automatic Removal via Software
    • Manual Removal via Hijack This
    • Disable / Re-enable System Restore
    • Clean Startup Items List (Regedit)
    • Defragment
    • Scan from another PC
    • Last Resort: Reformat Hard Drive
  • 11. Removal Help
    • Freebies
      • Spybot
      • Ad-Aware
      • Ccleaner
      • Grisoft AVG – Virus / Anti-Spyware / Rootkit Editions
      • Hijack This
    • Google / Search Engines
      • Search for “x Removal” or “x Removal Tool”
    • Forum Based Assistance
      • Wilder Security
    • Subscription Based
      • Kaspersky
      • PC Tools Spyware Doctor
      • Webroot Spy Sweeper
      • Norton Antivirus / McAfee Antivirus
  • 12. Current Issues and Remedies
    • Security software is convoluted
      • Google
    • Installing software after-the-fact
      • Remove infection from a different PC
    • File system corruption
      • Chkdsk /r from Recovery Console
      • Windows Repair Installation