SlideShare une entreprise Scribd logo
1  sur  9
Spam- What is it?
• Spam is the use
  of electronic
  messaging
  systems to send
  unsolicited bulk
  messages
  indiscriminately.
Spam- Brief History
• Spam infiltrated
  the public in the
  technology
  boom.
• Businesses used
  spam as a
  business tactic to
  increase
  popularity.
Spam- Business
• Spam, in the
  business world, is
  considered to be
  highly
  unprofessional in
  most industries.
• Costs businesses
  millions of dollars
  to combat
Spam- Public
• Spam also costs
  individuals across
  the world millions
  of dollars to combat
  their personal e-
  mails.
• Some view spam as
  an invasion of
  privacy.
Spam- Public
• Spam can also
  expose unwilling
  individuals, such as
  children, to
  inappropriate web
  content.
• Parents have to
  spend money for
  parental controls.
Spam- Future
• The future of spam is       NOT THIS KIND OF SPAM

  unknown.
• There have been
  several acts and
  legislation set in place.
• The infiltration of         THIS KIND OF SPAM!!!!
  spam could change
  how the public uses
  the internet forever.
Spam presentation
Spam presentation

Contenu connexe

Tendances

M&P Mobile Presentation
M&P Mobile PresentationM&P Mobile Presentation
M&P Mobile Presentationguest77abea0
 
Lesson 4 bridging the generation gap
Lesson 4 bridging the generation gapLesson 4 bridging the generation gap
Lesson 4 bridging the generation gapRosarah Nemo
 
Bridging the Generation Gap
Bridging the Generation GapBridging the Generation Gap
Bridging the Generation GapJoanne Suan
 
6329 r campachapter1
6329 r campachapter16329 r campachapter1
6329 r campachapter1rocam98
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyAlec Couros
 
Technology creates social isolation and neurosis by hardilmohit singh
Technology creates social isolation and neurosis by hardilmohit singhTechnology creates social isolation and neurosis by hardilmohit singh
Technology creates social isolation and neurosis by hardilmohit singhHardilmohit Singh
 
#IoT and the internet of me #ai #blockchain Talk april 2018
#IoT and the internet of me #ai #blockchain Talk april 2018#IoT and the internet of me #ai #blockchain Talk april 2018
#IoT and the internet of me #ai #blockchain Talk april 2018Dr. Julie Albright
 
Post industrial information technology
Post industrial information technologyPost industrial information technology
Post industrial information technologyPeterus Balan
 
PPSB-MASS MEDIA-COMPARATIVE STUDY
PPSB-MASS MEDIA-COMPARATIVE STUDYPPSB-MASS MEDIA-COMPARATIVE STUDY
PPSB-MASS MEDIA-COMPARATIVE STUDYMINDBOGGLERS
 
The Role of Libraries in a Transliterate World
The Role of Libraries in a Transliterate WorldThe Role of Libraries in a Transliterate World
The Role of Libraries in a Transliterate WorldBobbi Newman
 
Evolution of technology presentation ppt
Evolution of technology presentation pptEvolution of technology presentation ppt
Evolution of technology presentation pptArihantPatil8
 
How Do We Know
How Do We KnowHow Do We Know
How Do We KnowPat Sine
 
Digital divide and the economy
Digital divide and the economyDigital divide and the economy
Digital divide and the economyHeather Marie
 
Generational Issues and Distance Learning
 Generational Issues and Distance Learning Generational Issues and Distance Learning
Generational Issues and Distance LearningKathleen L. Gordon
 

Tendances (18)

M&P Mobile Presentation
M&P Mobile PresentationM&P Mobile Presentation
M&P Mobile Presentation
 
Lesson 4 bridging the generation gap
Lesson 4 bridging the generation gapLesson 4 bridging the generation gap
Lesson 4 bridging the generation gap
 
Sipa
SipaSipa
Sipa
 
Bridging the Generation Gap
Bridging the Generation GapBridging the Generation Gap
Bridging the Generation Gap
 
6329 r campachapter1
6329 r campachapter16329 r campachapter1
6329 r campachapter1
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
 
Technology creates social isolation and neurosis by hardilmohit singh
Technology creates social isolation and neurosis by hardilmohit singhTechnology creates social isolation and neurosis by hardilmohit singh
Technology creates social isolation and neurosis by hardilmohit singh
 
#IoT and the internet of me #ai #blockchain Talk april 2018
#IoT and the internet of me #ai #blockchain Talk april 2018#IoT and the internet of me #ai #blockchain Talk april 2018
#IoT and the internet of me #ai #blockchain Talk april 2018
 
Post industrial information technology
Post industrial information technologyPost industrial information technology
Post industrial information technology
 
ES_ 10 Author-Gottumutkala Sai Bhavani
ES_ 10 Author-Gottumutkala Sai BhavaniES_ 10 Author-Gottumutkala Sai Bhavani
ES_ 10 Author-Gottumutkala Sai Bhavani
 
PPSB-MASS MEDIA-COMPARATIVE STUDY
PPSB-MASS MEDIA-COMPARATIVE STUDYPPSB-MASS MEDIA-COMPARATIVE STUDY
PPSB-MASS MEDIA-COMPARATIVE STUDY
 
The Role of Libraries in a Transliterate World
The Role of Libraries in a Transliterate WorldThe Role of Libraries in a Transliterate World
The Role of Libraries in a Transliterate World
 
Evolution of technology presentation ppt
Evolution of technology presentation pptEvolution of technology presentation ppt
Evolution of technology presentation ppt
 
Tech tools task
Tech tools taskTech tools task
Tech tools task
 
How Do We Know
How Do We KnowHow Do We Know
How Do We Know
 
Digital divide and the economy
Digital divide and the economyDigital divide and the economy
Digital divide and the economy
 
Generational Issues and Distance Learning
 Generational Issues and Distance Learning Generational Issues and Distance Learning
Generational Issues and Distance Learning
 
Power of social media
Power of social mediaPower of social media
Power of social media
 

Similaire à Spam presentation

Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Typeshirakhalid2394
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crimegagan deep
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetejNishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttwNishaTariq1
 
Dark side of it and cyber crime
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crimePuja Dhakal
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimessweta dargad
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environmentJeet Kothadiya
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...Egyptian Engineers Association
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetSai Sreeram
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Sciencemissstevenson01
 

Similaire à Spam presentation (20)

Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crime
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
Spam
SpamSpam
Spam
 
part 3 cyber crimes
part 3 cyber crimes part 3 cyber crimes
part 3 cyber crimes
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Spam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a ThreatSpam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a Threat
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Dark side of it and cyber crime
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crime
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Science
 

Dernier

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Spam presentation

  • 1.
  • 2. Spam- What is it? • Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately.
  • 3. Spam- Brief History • Spam infiltrated the public in the technology boom. • Businesses used spam as a business tactic to increase popularity.
  • 4. Spam- Business • Spam, in the business world, is considered to be highly unprofessional in most industries. • Costs businesses millions of dollars to combat
  • 5. Spam- Public • Spam also costs individuals across the world millions of dollars to combat their personal e- mails. • Some view spam as an invasion of privacy.
  • 6. Spam- Public • Spam can also expose unwilling individuals, such as children, to inappropriate web content. • Parents have to spend money for parental controls.
  • 7. Spam- Future • The future of spam is NOT THIS KIND OF SPAM unknown. • There have been several acts and legislation set in place. • The infiltration of THIS KIND OF SPAM!!!! spam could change how the public uses the internet forever.