Spam, Spyware, and Security Presentation by Ryan Southwick
E-mail Spam <ul><li>Not Spam </li></ul><ul><ul><li>Unsolicited Legitimate E-mail </li></ul></ul><ul><ul><li>Job Inquiries,...
Spam Statistics <ul><ul><li>Chronology </li></ul></ul><ul><ul><ul><li>1978 - An e-mail spam is sent to 600 addresses. </li...
How do you get Spam? <ul><li>Harvesting of E-mail Addresses </li></ul><ul><ul><li>Chat rooms, Websites, Newsgroups </li></...
Prevention <ul><li>Behavioral Tips </li></ul><ul><ul><li>Use a “Spam” E-mail Account </li></ul></ul><ul><ul><ul><li>Use fo...
Spam Filtering Specifics <ul><li>ISP / E-mail Provider Techniques </li></ul><ul><ul><li>Greylist </li></ul></ul><ul><ul><l...
Spyware and Viruses <ul><li>Spyware / Malware </li></ul><ul><ul><li>Collect Data, Statistical Information </li></ul></ul><...
What do they have to gain? <ul><li>Statistical Information </li></ul><ul><li>Exploit Personal Information </li></ul><ul><l...
Prevention <ul><li>Firewall </li></ul><ul><ul><li>Hardware </li></ul></ul><ul><ul><ul><li>NAT: masks computer behind firew...
Removal Recommendations <ul><li>Install and Update Software </li></ul><ul><li>Remove Temp Files (Ccleaner) </li></ul><ul><...
Removal Help <ul><li>Freebies </li></ul><ul><ul><li>Spybot </li></ul></ul><ul><ul><li>Ad-Aware </li></ul></ul><ul><ul><li>...
Current Issues and Remedies <ul><li>Security software is convoluted </li></ul><ul><ul><li>Google </li></ul></ul><ul><li>In...
Upcoming SlideShare
Loading in...5
×

Spam, Spyware, and Security Presentation by Ryan Southwick

385

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
385
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Spam, Spyware, and Security Presentation by Ryan Southwick

  1. 1. Spam, Spyware, and Security Presentation by Ryan Southwick
  2. 2. E-mail Spam <ul><li>Not Spam </li></ul><ul><ul><li>Unsolicited Legitimate E-mail </li></ul></ul><ul><ul><li>Job Inquiries, First Contact </li></ul></ul><ul><ul><li>Bulk Legitimate E-mail </li></ul></ul><ul><ul><li>Newsletters, Discussion Lists </li></ul></ul><ul><li>Spam (UBE) </li></ul><ul><ul><li>Unsolicited and Bulk </li></ul></ul><ul><ul><ul><li>UCE: Unsolicited Commercial E-mail </li></ul></ul></ul><ul><ul><ul><ul><li>Viagra </li></ul></ul></ul></ul><ul><ul><ul><li>Phishing / Scam </li></ul></ul></ul><ul><ul><ul><ul><li>Nigerian </li></ul></ul></ul></ul>
  3. 3. Spam Statistics <ul><ul><li>Chronology </li></ul></ul><ul><ul><ul><li>1978 - An e-mail spam is sent to 600 addresses. </li></ul></ul></ul><ul><ul><ul><li>1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. </li></ul></ul></ul><ul><ul><ul><li>2005 - (June) 30 billion per day </li></ul></ul></ul><ul><ul><ul><li>2006 - (June) 55 billion per day </li></ul></ul></ul><ul><ul><ul><li>2006 - (December) 85 billion per day </li></ul></ul></ul><ul><ul><ul><li>2007 - (February) 90 billion per day </li></ul></ul></ul><ul><ul><li>80% created by fewer than 200 organizations </li></ul></ul><ul><ul><li>80% sent from virus infected computers and botnets </li></ul></ul><ul><ul><li>United States, China, South Korea top spam sending nations </li></ul></ul>
  4. 4. How do you get Spam? <ul><li>Harvesting of E-mail Addresses </li></ul><ul><ul><li>Chat rooms, Websites, Newsgroups </li></ul></ul><ul><ul><li>Viruses that target Address Book </li></ul></ul><ul><ul><li>Companies selling User Information </li></ul></ul><ul><ul><li>Database Exploits / Hacks </li></ul></ul><ul><ul><li>Search Engines </li></ul></ul><ul><ul><li>Bots </li></ul></ul><ul><ul><li>Using Public Terminals </li></ul></ul><ul><ul><li>Random Generation </li></ul></ul>
  5. 5. Prevention <ul><li>Behavioral Tips </li></ul><ul><ul><li>Use a “Spam” E-mail Account </li></ul></ul><ul><ul><ul><li>Use for spam account for: Newsletters, Registration, Questionnaires </li></ul></ul></ul><ul><ul><ul><li>Use primary account for: Event tickets, personal friends, and trusted sites like Amazon and Ebay </li></ul></ul></ul><ul><ul><li>Read fine print </li></ul></ul><ul><ul><li>Sign out after using public computers </li></ul></ul><ul><ul><li>Use BCC function when sending out e-mails </li></ul></ul><ul><ul><li>Don’t hit “Reply All” </li></ul></ul><ul><ul><li>When Forwarding messages, remove all other people’s e-mail addresses </li></ul></ul><ul><ul><li>Don’t Unsubscribe to newsletters you never subscribed to </li></ul></ul><ul><li>Software </li></ul><ul><ul><li>Updates </li></ul></ul><ul><ul><ul><li>Operating System </li></ul></ul></ul><ul><ul><ul><li>Applications </li></ul></ul></ul><ul><ul><ul><li>Security Software </li></ul></ul></ul><ul><ul><ul><ul><li>Scan Incoming Messages </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Scan Attachments </li></ul></ul></ul></ul>
  6. 6. Spam Filtering Specifics <ul><li>ISP / E-mail Provider Techniques </li></ul><ul><ul><li>Greylist </li></ul></ul><ul><ul><li>Whitelist </li></ul></ul><ul><ul><li>Blacklist </li></ul></ul><ul><ul><li>3 rd Party Spam Filtering Services </li></ul></ul><ul><ul><ul><li>Postini </li></ul></ul></ul><ul><ul><li>Spam Assassin </li></ul></ul><ul><li>Spam Filtering Clients </li></ul>
  7. 7. Spyware and Viruses <ul><li>Spyware / Malware </li></ul><ul><ul><li>Collect Data, Statistical Information </li></ul></ul><ul><ul><li>Fraudulent Products </li></ul></ul><ul><ul><li>Toolbars </li></ul></ul><ul><ul><li>How are they Installed? </li></ul></ul><ul><ul><ul><li>Active-x controls </li></ul></ul></ul><ul><ul><ul><li>Manually via virus infection </li></ul></ul></ul><ul><li>Viruses </li></ul><ul><ul><li>Good portion contracted through e-mail, peer to peer, social networking sites </li></ul></ul><ul><ul><li>Propogate though Operating System and application security holes </li></ul></ul><ul><ul><li>Trojan </li></ul></ul><ul><ul><li>Botnet </li></ul></ul>
  8. 8. What do they have to gain? <ul><li>Statistical Information </li></ul><ul><li>Exploit Personal Information </li></ul><ul><li>Money </li></ul>
  9. 9. Prevention <ul><li>Firewall </li></ul><ul><ul><li>Hardware </li></ul></ul><ul><ul><ul><li>NAT: masks computer behind firewall </li></ul></ul></ul><ul><ul><li>Software </li></ul></ul><ul><ul><ul><li>Monitors incoming and outgoing traffic, user prompting </li></ul></ul></ul><ul><li>Anti-virus: Active file monitoring </li></ul><ul><li>Anti-spyware: Active file monitoring and immunization </li></ul><ul><li>Suites: All-in-one </li></ul><ul><li>Browsers (Windows) </li></ul><ul><ul><li>Firefox, Opera, Safari </li></ul></ul><ul><li>No File Sharing Applications </li></ul>
  10. 10. Removal Recommendations <ul><li>Install and Update Software </li></ul><ul><li>Remove Temp Files (Ccleaner) </li></ul><ul><li>Clear startup items (Msconfig) </li></ul><ul><li>Scan in Safe Mode </li></ul><ul><li>Automatic Removal via Software </li></ul><ul><li>Manual Removal via Hijack This </li></ul><ul><li>Disable / Re-enable System Restore </li></ul><ul><li>Clean Startup Items List (Regedit) </li></ul><ul><li>Defragment </li></ul><ul><li>Scan from another PC </li></ul><ul><li>Last Resort: Reformat Hard Drive </li></ul>
  11. 11. Removal Help <ul><li>Freebies </li></ul><ul><ul><li>Spybot </li></ul></ul><ul><ul><li>Ad-Aware </li></ul></ul><ul><ul><li>Ccleaner </li></ul></ul><ul><ul><li>Grisoft AVG – Virus / Anti-Spyware / Rootkit Editions </li></ul></ul><ul><ul><li>Hijack This </li></ul></ul><ul><li>Google / Search Engines </li></ul><ul><ul><li>Search for “x Removal” or “x Removal Tool” </li></ul></ul><ul><li>Forum Based Assistance </li></ul><ul><ul><li>Wilder Security </li></ul></ul><ul><li>Subscription Based </li></ul><ul><ul><li>Kaspersky </li></ul></ul><ul><ul><li>PC Tools Spyware Doctor </li></ul></ul><ul><ul><li>Webroot Spy Sweeper </li></ul></ul><ul><ul><li>Norton Antivirus / McAfee Antivirus </li></ul></ul>
  12. 12. Current Issues and Remedies <ul><li>Security software is convoluted </li></ul><ul><ul><li>Google </li></ul></ul><ul><li>Installing software after-the-fact </li></ul><ul><ul><li>Remove infection from a different PC </li></ul></ul><ul><li>File system corruption </li></ul><ul><ul><li>Chkdsk /r from Recovery Console </li></ul></ul><ul><ul><li>Windows Repair Installation </li></ul></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×