Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Group: 5 
Ya Putheara 
Nem Sopheak 
Chamroeun Daro 
Kheiv Chanthy 
Oeurn Sophearith 
Lecturer 
: 
OU PHANNARITH
-­‐Email 
spam, 
also 
known 
as 
junk 
email 
or 
unsolicited 
bulk 
email 
(UBE), 
is 
a 
subset 
of 
electronic 
spam 
...
-­‐Email 
spam 
has 
steadily 
grown 
since 
the 
early 
1990s. 
Botnets, 
networks 
of 
virus-­‐infected 
computers, 
are...
Spam 
has 
several 
definitions 
varying 
by 
source. 
-­‐Unsolicited 
bulk 
email 
(UBE)—unsolicited 
email 
,sent 
in 
l...
-­‐According 
to 
information 
compiled 
by 
Commtouch 
Software 
Ltd., 
email 
spam 
for 
the 
first 
quarter 
of 
2010 
...
Appending: 
-­‐If 
a 
marketer 
has 
one 
database 
containing 
names, 
addresses, 
and 
telephone 
numbers 
of 
prospecti...
-­‐Image 
spam, 
or 
Image-­‐based 
spam 
is 
an 
obfuscating 
method 
in 
which 
the 
text 
of 
the 
message 
is 
stored ...
-­‐Blank 
spam 
is 
spam 
lacking 
a 
payload 
advertisement. 
Often 
the 
message 
body 
is 
missing 
altogether, 
as 
we...
-­‐Backscatter 
is 
a 
side-­‐effect 
of 
email 
spam, 
viruses 
and 
worms, 
where 
email 
servers 
receiving 
spam 
and ...
-­‐Install 
spam 
filtering/blocking 
software. 
-­‐Do 
not 
respond 
to 
suspicious 
emails 
. 
-­‐Set 
up 
a 
disposable...
P12 r202t8 05-spam
P12 r202t8 05-spam
Upcoming SlideShare
Loading in …5
×

P12 r202t8 05-spam

240 views

Published on

  • Be the first to comment

  • Be the first to like this

P12 r202t8 05-spam

  1. 1. Group: 5 Ya Putheara Nem Sopheak Chamroeun Daro Kheiv Chanthy Oeurn Sophearith Lecturer : OU PHANNARITH
  2. 2. -­‐Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email -­‐Spam email may also include malware as scripts or other executable file attachments.
  3. 3. -­‐Email spam has steadily grown since the early 1990s. Botnets, networks of virus-­‐infected computers, are used to send about 80% of spam. Since the expense of the spam is borne mostly by the recipient, it is effectively postage due advertising. -­‐spam was declared to be legal by the CAN-­‐SPAM Act of 2003 provided the message adheres to certain specifications.
  4. 4. Spam has several definitions varying by source. -­‐Unsolicited bulk email (UBE)—unsolicited email ,sent in large quantities. -­‐Unsolicited commercial email (UCE)—this more restrictive definition is used by regulators whose mandate is to regulate commerce, such as the U.S. Federal Trade Commission
  5. 5. -­‐According to information compiled by Commtouch Software Ltd., email spam for the first quarter of 2010 can be broken down as follows. EMail Spam by Topic
  6. 6. Appending: -­‐If a marketer has one database containing names, addresses, and telephone numbers of prospective customers, they can pay to have their database matched against an external database containing email addresses.
  7. 7. -­‐Image spam, or Image-­‐based spam is an obfuscating method in which the text of the message is stored as a GIF or JPEG image and displayed in the email.
  8. 8. -­‐Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, as well as the subject line.
  9. 9. -­‐Backscatter is a side-­‐effect of email spam, viruses and worms, where email servers receiving spam and other mail send bounce messages to an innocent party.
  10. 10. -­‐Install spam filtering/blocking software. -­‐Do not respond to suspicious emails . -­‐Set up a disposable email address . -­‐Create an email name that's tough to crack . -­‐View emails in plain text . -­‐Create a spam filter for your email . -­‐Do not post links to email addresses on web sites -­‐Watch out for those checked boxes -­‐Report spam

×