SlideShare a Scribd company logo
1 of 20
SPAMMING AS CYBER CRIME
INTRODUCTION
• SPAM- Sending spam emails sent to a large
number of Internet users without their
consent
• VIRUS- A harmful program hiding in other
innocent programs
• CYBER CRIME- Crime that is committed on the
internet
DEFINITION
• SPAM is defined as an unsolicited, unwanted,
postings on social network websites or suspicious
emails sent to a large number of users.
• Social Spam is unwanted spam content appearing
on social network and any website with user-
generated content (comments, chat, etc.). It can
be manifested in many ways, including bulk
messages, profanity, insults, hate speech,
malicious links, fraudulent reviews, fake friends,
and personally identifiable information.
• Spammer- A person who creates electronic
spam is called a spammer
HISTORY
• The first major commercial spam incident began on
March 5, 1994.
• In a few years, the focus of spam (and anti-spam
efforts) has shifted primarily to electronic mail, where
it still resides today. It can be argued that aggressive
spam emails from various high profile spammers like
Sanford Wallace of Cyber Promotions in the mid to late
1990s helped make spam primarily an email
phenomenon in the public mind.
• In 2009, the majority of spam emails sent worldwide
were in English. Spammers have started using machine
translation services to send spam in other languages.
TYPES
• E-mail
• Instant Messaging
• Mobile Phones
• Social Networking Spam
• Social Spam
• Spam Targeting Video Sharing Sites
• Academic search
• Mobile Apps
E-MAIL
• Email Spam, also known as unsolicited bulk email
(UBE), spam, or unsolicited commercial email
(UCE), is the sending of unwanted email
messages, often with commercial content, in
large quantities. to a set of indiscriminate
recipients. Spam in e-mail began to become a
problem when the Internet was opened to the
general public in the mid-1990s. It has grown
exponentially in the following years and today
represents between 80 and 85%. of all emails in
the world. according to a “conservative estimate”.
INSTANT MESSAGING
• According to a report by Ferris Research, 500
million spam instant messages were sent in
2003, double the 2002 level. Instant
messaging is rarely blocked by firewalls,
making it a particularly useful channel for
spammers. . This is very common in many
instant messaging systems such as like Skype
MOBILE PHONES
• Mobile phone spam targets the text messaging service
of a mobile phone. This can be particularly irritating for
customers, not just for the inconveniences, but also for
the costs which can be invoiced by SMS received in
certain markets.
• The term "SpaSMS" was coined on the adnews Adland
website in 2000 to describe spam. To comply with CAN-
SPAM regulations in the United States, SMS messages
must now provide the HELP and STOP options, the
latter completely terminating communication with the
advertiser by SMS.
SOCIAL NETWORKING SPAM
• Facebook and Twitter are not immune to messages
containing spam links. Spammers hack into accounts and
send fake links disguised as the user's trusted contacts,
such as friends and family.
• As for Twitter, spammers gain credibility by following
verified accounts like Lady Gaga's; When the account
owner follows the spammer, they legitimize the spammer.
• Twitter has studied which structures of interest allow its
users to receive interesting tweets and avoid spam, despite
the fact that the site uses the delivery model, in which all of
a user's tweets are broadcast to all. user subscribers.
Spammers, with malicious intent, post unwanted (or
irrelevant) information or spread false information on social
media platforms.
SOCIAL SPAM
• Extending beyond centrally managed social
media platforms, user-generated content is
increasingly appearing on commercial,
government and non-profit websites around the
world.
• Fake accounts and comments entered by
computers programmed to send social spam can
infiltrate these websites.
• Well-meaning and malicious human users can
violate website policies by sending profanity,
slurs, hate speech and violent messages.
SPAM TARGETING VIDEO SHARING
SITES
• In actual video spam, the uploaded movie is given a name and description
with a popular figure or event likely to attract attention, or within the
video a certain image is programmed to appear as the video thumbnail
image to fool the user. viewer, such as a still image from a feature film,
pretending to be part by part of a pirated movie, eg. Big Buck Bunny Full
Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file
for a video game or something similar. The actual content of the video
ends up being totally alien, a Rickroll, offensive, or just a text on the
screen of a link to the site that is being promoted. In some cases, the link
in question may lead to an online survey site, a password-protected
archive file with instructions leading to the aforementioned survey
(although the survey, and the archive file itself, have no value and do not
contain the file in question), or in extreme cases, malware. Others may
upload videos presented in an infomercial-like format selling their product
featuring paid actors and testimonials, although the promoted product or
service is of questionable quality and would likely not pass the scrutiny of
a standards and practices department at a television station. or cable.
network
Screenshot from a spam video on
YouTube claiming that the film in
question has been deleted from the site,
and can only be accessed on the link
posted by the spambot in the video
description (if the video were actually
removed by YouTube, the description
would be inaccessible and the deletion
notification would look different)
ACADEMIC SEARCH
• Spam dexing refers to a World Wide Web practice of
modifying HTML pages to increase your chances of ranking
high in search engine relevance lists.
• These sites use “black hat” search engine optimization
techniques to deliberately manipulate their search engine
rankings. Many modern search engines have changed their
search algorithms to try to exclude the web pages that use
spam indexing tactics.
• For example, search bots will detect repeated keywords as
spam using grammar analysis. If it turns out that a website
owner spammed the website to falsely increase their page
ranking, the website may be penalized by the search
engines.
Mobile Apps
• Mobile Application Store spam includes
I. applications that have been generated
automatically and therefore have no specific
functionality or meaningful description.
II. the publication of several instances of the same
application to obtain greater visibility on the
application market.
III. applications that make excessive use of
unrelated keywords to attract users through
unwanted searches
SOLUTION
• There are different solutions to SPAM that you
can use, such as:
– Self solution
– White List Solutions
– Black List Solutions
– Software Solutions
– Heuristic Filters
– Content Filters
• Self solution
– The automatic solution implies that the user sees and eliminates
the SPAM in their mailbox.
– While it can be effective, it is time consuming and frustrating.
• Whitelist solution:
– Whitelists allow you to receive mail from senders in your
address book.
– Mail from senders who are not in your address book will be
stored in the spam folder.
– In some cases, mail from senders who are not in the address
book will be deleted.
• Blacklist solutions
– A blacklist contains domain names or email addresses of
companies called spammers.
– There is software available that helps you list known SPAM
domains or email addresses; these will be spammed or deleted.
• Software solution
– Software solutions have rules or are linked to Internet blacklists
– the software is usually installed on a computer or server.
– Examples of SPAM software solutions include BitDefender, Imail
or Mailwasher, ADWCleaner, ETC.
• Heuristic filters:
– A heuristic filter searches for characteristics, links, words and
phrases commonly used in SPAM.
– There are certain rules which are used in the program to
indicate whether the email is SPAM or not.
• Content Filters
– SPAM can also be indicated by the content of the email or web
page.
– Rules are used to decide whether the content is SPAM or not.
– The subject, attachments, headers, size and body content are
displayed to help decide if it is classified as SPAM
LAW AGAINST SPAMMING IN INDIA
PRESENTLY
• the Indian government has not yet enacted a
law that directly addresses the problem of
spam. The existing law in the form of the
Information Technology Act 2000 does not
contain any provision regarding the regulation
of spam, although it does regulate obscenity
covering the publication, transmission or
electronic publication of anything. material
that is obscene or that attracts obscene
people. to interest
CONCULSION
• SPAM is a long, frustrating and potentially
harmful Internet plug-in for your computer.
Take note of the ways to prevent SPAM from
cluttering your mailbox. At the same time,
make sure that your site is not seen as spam.

More Related Content

What's hot

What's hot (20)

Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Phishing
PhishingPhishing
Phishing
 
Email bombing
Email bombingEmail bombing
Email bombing
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Spam
Spam Spam
Spam
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
An overview on laws against spamming in India
An overview on laws against spamming in IndiaAn overview on laws against spamming in India
An overview on laws against spamming in India
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 

Similar to Spamming as cyber crime

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Digital literacy edpc605
Digital literacy edpc605Digital literacy edpc605
Digital literacy edpc605Barbara M. King
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...Pedram Hayati
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ictsiewying
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 

Similar to Spamming as cyber crime (20)

SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Phishing
PhishingPhishing
Phishing
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Digital literacy edpc605
Digital literacy edpc605Digital literacy edpc605
Digital literacy edpc605
 
internet security
internet securityinternet security
internet security
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 

More from gagan deep

Transnational organized crime its concept
Transnational organized crime its conceptTransnational organized crime its concept
Transnational organized crime its conceptgagan deep
 
Theories of justice
Theories of justiceTheories of justice
Theories of justicegagan deep
 
The salient features of prevention of terrorism act, 2002
The salient features of prevention of terrorism act, 2002The salient features of prevention of terrorism act, 2002
The salient features of prevention of terrorism act, 2002gagan deep
 
The election of judges of international criminal court
The election of judges of international criminal courtThe election of judges of international criminal court
The election of judges of international criminal courtgagan deep
 
Summaries the article competence of two judge benches of supreme court to ref...
Summaries the article competence of two judge benches of supreme court to ref...Summaries the article competence of two judge benches of supreme court to ref...
Summaries the article competence of two judge benches of supreme court to ref...gagan deep
 
Specific crimes under icc
Specific crimes under iccSpecific crimes under icc
Specific crimes under iccgagan deep
 
Principle of complementarity
Principle of complementarityPrinciple of complementarity
Principle of complementaritygagan deep
 
Precedents concept and kinds
Precedents concept and kindsPrecedents concept and kinds
Precedents concept and kindsgagan deep
 
Law and legitimacy
Law and legitimacyLaw and legitimacy
Law and legitimacygagan deep
 
Internal aids of interpretation and construction of statutes
Internal aids of interpretation and construction of statutesInternal aids of interpretation and construction of statutes
Internal aids of interpretation and construction of statutesgagan deep
 
Fiscal technique
Fiscal techniqueFiscal technique
Fiscal techniquegagan deep
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collectiongagan deep
 
Drug trafficking and the role of ndps act in curbing the menace of organized ...
Drug trafficking and the role of ndps act in curbing the menace of organized ...Drug trafficking and the role of ndps act in curbing the menace of organized ...
Drug trafficking and the role of ndps act in curbing the menace of organized ...gagan deep
 
Difference between legal logic and legal rhetoric
Difference between legal logic and legal rhetoricDifference between legal logic and legal rhetoric
Difference between legal logic and legal rhetoricgagan deep
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
Vicarious liability under criminal law
Vicarious liability under criminal law Vicarious liability under criminal law
Vicarious liability under criminal law gagan deep
 
Type of research method are used
Type of research method are used Type of research method are used
Type of research method are used gagan deep
 
Trial process in uk
Trial process in ukTrial process in uk
Trial process in ukgagan deep
 
Rights of accused persons criminal law
Rights of accused persons criminal law Rights of accused persons criminal law
Rights of accused persons criminal law gagan deep
 
research Qualitative vs. quantitative research
research Qualitative vs. quantitative researchresearch Qualitative vs. quantitative research
research Qualitative vs. quantitative researchgagan deep
 

More from gagan deep (20)

Transnational organized crime its concept
Transnational organized crime its conceptTransnational organized crime its concept
Transnational organized crime its concept
 
Theories of justice
Theories of justiceTheories of justice
Theories of justice
 
The salient features of prevention of terrorism act, 2002
The salient features of prevention of terrorism act, 2002The salient features of prevention of terrorism act, 2002
The salient features of prevention of terrorism act, 2002
 
The election of judges of international criminal court
The election of judges of international criminal courtThe election of judges of international criminal court
The election of judges of international criminal court
 
Summaries the article competence of two judge benches of supreme court to ref...
Summaries the article competence of two judge benches of supreme court to ref...Summaries the article competence of two judge benches of supreme court to ref...
Summaries the article competence of two judge benches of supreme court to ref...
 
Specific crimes under icc
Specific crimes under iccSpecific crimes under icc
Specific crimes under icc
 
Principle of complementarity
Principle of complementarityPrinciple of complementarity
Principle of complementarity
 
Precedents concept and kinds
Precedents concept and kindsPrecedents concept and kinds
Precedents concept and kinds
 
Law and legitimacy
Law and legitimacyLaw and legitimacy
Law and legitimacy
 
Internal aids of interpretation and construction of statutes
Internal aids of interpretation and construction of statutesInternal aids of interpretation and construction of statutes
Internal aids of interpretation and construction of statutes
 
Fiscal technique
Fiscal techniqueFiscal technique
Fiscal technique
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Drug trafficking and the role of ndps act in curbing the menace of organized ...
Drug trafficking and the role of ndps act in curbing the menace of organized ...Drug trafficking and the role of ndps act in curbing the menace of organized ...
Drug trafficking and the role of ndps act in curbing the menace of organized ...
 
Difference between legal logic and legal rhetoric
Difference between legal logic and legal rhetoricDifference between legal logic and legal rhetoric
Difference between legal logic and legal rhetoric
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Vicarious liability under criminal law
Vicarious liability under criminal law Vicarious liability under criminal law
Vicarious liability under criminal law
 
Type of research method are used
Type of research method are used Type of research method are used
Type of research method are used
 
Trial process in uk
Trial process in ukTrial process in uk
Trial process in uk
 
Rights of accused persons criminal law
Rights of accused persons criminal law Rights of accused persons criminal law
Rights of accused persons criminal law
 
research Qualitative vs. quantitative research
research Qualitative vs. quantitative researchresearch Qualitative vs. quantitative research
research Qualitative vs. quantitative research
 

Recently uploaded

Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955Abheet Mangleek
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 

Recently uploaded (20)

Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 

Spamming as cyber crime

  • 2. INTRODUCTION • SPAM- Sending spam emails sent to a large number of Internet users without their consent • VIRUS- A harmful program hiding in other innocent programs • CYBER CRIME- Crime that is committed on the internet
  • 3. DEFINITION • SPAM is defined as an unsolicited, unwanted, postings on social network websites or suspicious emails sent to a large number of users. • Social Spam is unwanted spam content appearing on social network and any website with user- generated content (comments, chat, etc.). It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.
  • 4. • Spammer- A person who creates electronic spam is called a spammer
  • 5. HISTORY • The first major commercial spam incident began on March 5, 1994. • In a few years, the focus of spam (and anti-spam efforts) has shifted primarily to electronic mail, where it still resides today. It can be argued that aggressive spam emails from various high profile spammers like Sanford Wallace of Cyber Promotions in the mid to late 1990s helped make spam primarily an email phenomenon in the public mind. • In 2009, the majority of spam emails sent worldwide were in English. Spammers have started using machine translation services to send spam in other languages.
  • 6. TYPES • E-mail • Instant Messaging • Mobile Phones • Social Networking Spam • Social Spam • Spam Targeting Video Sharing Sites • Academic search • Mobile Apps
  • 7. E-MAIL • Email Spam, also known as unsolicited bulk email (UBE), spam, or unsolicited commercial email (UCE), is the sending of unwanted email messages, often with commercial content, in large quantities. to a set of indiscriminate recipients. Spam in e-mail began to become a problem when the Internet was opened to the general public in the mid-1990s. It has grown exponentially in the following years and today represents between 80 and 85%. of all emails in the world. according to a “conservative estimate”.
  • 8. INSTANT MESSAGING • According to a report by Ferris Research, 500 million spam instant messages were sent in 2003, double the 2002 level. Instant messaging is rarely blocked by firewalls, making it a particularly useful channel for spammers. . This is very common in many instant messaging systems such as like Skype
  • 9. MOBILE PHONES • Mobile phone spam targets the text messaging service of a mobile phone. This can be particularly irritating for customers, not just for the inconveniences, but also for the costs which can be invoiced by SMS received in certain markets. • The term "SpaSMS" was coined on the adnews Adland website in 2000 to describe spam. To comply with CAN- SPAM regulations in the United States, SMS messages must now provide the HELP and STOP options, the latter completely terminating communication with the advertiser by SMS.
  • 10. SOCIAL NETWORKING SPAM • Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send fake links disguised as the user's trusted contacts, such as friends and family. • As for Twitter, spammers gain credibility by following verified accounts like Lady Gaga's; When the account owner follows the spammer, they legitimize the spammer. • Twitter has studied which structures of interest allow its users to receive interesting tweets and avoid spam, despite the fact that the site uses the delivery model, in which all of a user's tweets are broadcast to all. user subscribers. Spammers, with malicious intent, post unwanted (or irrelevant) information or spread false information on social media platforms.
  • 11. SOCIAL SPAM • Extending beyond centrally managed social media platforms, user-generated content is increasingly appearing on commercial, government and non-profit websites around the world. • Fake accounts and comments entered by computers programmed to send social spam can infiltrate these websites. • Well-meaning and malicious human users can violate website policies by sending profanity, slurs, hate speech and violent messages.
  • 12. SPAM TARGETING VIDEO SHARING SITES • In actual video spam, the uploaded movie is given a name and description with a popular figure or event likely to attract attention, or within the video a certain image is programmed to appear as the video thumbnail image to fool the user. viewer, such as a still image from a feature film, pretending to be part by part of a pirated movie, eg. Big Buck Bunny Full Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file for a video game or something similar. The actual content of the video ends up being totally alien, a Rickroll, offensive, or just a text on the screen of a link to the site that is being promoted. In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions leading to the aforementioned survey (although the survey, and the archive file itself, have no value and do not contain the file in question), or in extreme cases, malware. Others may upload videos presented in an infomercial-like format selling their product featuring paid actors and testimonials, although the promoted product or service is of questionable quality and would likely not pass the scrutiny of a standards and practices department at a television station. or cable. network
  • 13. Screenshot from a spam video on YouTube claiming that the film in question has been deleted from the site, and can only be accessed on the link posted by the spambot in the video description (if the video were actually removed by YouTube, the description would be inaccessible and the deletion notification would look different)
  • 14. ACADEMIC SEARCH • Spam dexing refers to a World Wide Web practice of modifying HTML pages to increase your chances of ranking high in search engine relevance lists. • These sites use “black hat” search engine optimization techniques to deliberately manipulate their search engine rankings. Many modern search engines have changed their search algorithms to try to exclude the web pages that use spam indexing tactics. • For example, search bots will detect repeated keywords as spam using grammar analysis. If it turns out that a website owner spammed the website to falsely increase their page ranking, the website may be penalized by the search engines.
  • 15. Mobile Apps • Mobile Application Store spam includes I. applications that have been generated automatically and therefore have no specific functionality or meaningful description. II. the publication of several instances of the same application to obtain greater visibility on the application market. III. applications that make excessive use of unrelated keywords to attract users through unwanted searches
  • 16. SOLUTION • There are different solutions to SPAM that you can use, such as: – Self solution – White List Solutions – Black List Solutions – Software Solutions – Heuristic Filters – Content Filters
  • 17. • Self solution – The automatic solution implies that the user sees and eliminates the SPAM in their mailbox. – While it can be effective, it is time consuming and frustrating. • Whitelist solution: – Whitelists allow you to receive mail from senders in your address book. – Mail from senders who are not in your address book will be stored in the spam folder. – In some cases, mail from senders who are not in the address book will be deleted. • Blacklist solutions – A blacklist contains domain names or email addresses of companies called spammers. – There is software available that helps you list known SPAM domains or email addresses; these will be spammed or deleted.
  • 18. • Software solution – Software solutions have rules or are linked to Internet blacklists – the software is usually installed on a computer or server. – Examples of SPAM software solutions include BitDefender, Imail or Mailwasher, ADWCleaner, ETC. • Heuristic filters: – A heuristic filter searches for characteristics, links, words and phrases commonly used in SPAM. – There are certain rules which are used in the program to indicate whether the email is SPAM or not. • Content Filters – SPAM can also be indicated by the content of the email or web page. – Rules are used to decide whether the content is SPAM or not. – The subject, attachments, headers, size and body content are displayed to help decide if it is classified as SPAM
  • 19. LAW AGAINST SPAMMING IN INDIA PRESENTLY • the Indian government has not yet enacted a law that directly addresses the problem of spam. The existing law in the form of the Information Technology Act 2000 does not contain any provision regarding the regulation of spam, although it does regulate obscenity covering the publication, transmission or electronic publication of anything. material that is obscene or that attracts obscene people. to interest
  • 20. CONCULSION • SPAM is a long, frustrating and potentially harmful Internet plug-in for your computer. Take note of the ways to prevent SPAM from cluttering your mailbox. At the same time, make sure that your site is not seen as spam.