SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Group: 5 
Ya Putheara 
Nem Sopheak 
Chamroeun Daro 
Kheiv Chanthy 
Oeurn Sophearith 
Lecturer 
: 
OU PHANNARITH
-­‐Email 
spam, 
also 
known 
as 
junk 
email 
or 
unsolicited 
bulk 
email 
(UBE), 
is 
a 
subset 
of 
electronic 
spam 
involving 
nearly 
identical 
messages 
sent 
to 
numerous 
recipients 
by 
email 
-­‐Spam 
email 
may 
also 
include 
malware 
as 
scripts 
or 
other 
executable 
file 
attachments.
-­‐Email 
spam 
has 
steadily 
grown 
since 
the 
early 
1990s. 
Botnets, 
networks 
of 
virus-­‐infected 
computers, 
are 
used 
to 
send 
about 
80% 
of 
spam. 
Since 
the 
expense 
of 
the 
spam 
is 
borne 
mostly 
by 
the 
recipient, 
it 
is 
effectively 
postage 
due 
advertising. 
-­‐spam 
was 
declared 
to 
be 
legal 
by 
the 
CAN-­‐SPAM 
Act 
of 
2003 
provided 
the 
message 
adheres 
to 
certain 
specifications.
Spam 
has 
several 
definitions 
varying 
by 
source. 
-­‐Unsolicited 
bulk 
email 
(UBE)—unsolicited 
email 
,sent 
in 
large 
quantities. 
-­‐Unsolicited 
commercial 
email 
(UCE)—this 
more 
restrictive 
definition 
is 
used 
by 
regulators 
whose 
mandate 
is 
to 
regulate 
commerce, 
such 
as 
the 
U.S. 
Federal 
Trade 
Commission
-­‐According 
to 
information 
compiled 
by 
Commtouch 
Software 
Ltd., 
email 
spam 
for 
the 
first 
quarter 
of 
2010 
can 
be 
broken 
down 
as 
follows. 
EMail 
Spam 
by 
Topic
Appending: 
-­‐If 
a 
marketer 
has 
one 
database 
containing 
names, 
addresses, 
and 
telephone 
numbers 
of 
prospective 
customers, 
they 
can 
pay 
to 
have 
their 
database 
matched 
against 
an 
external 
database 
containing 
email 
addresses.
-­‐Image 
spam, 
or 
Image-­‐based 
spam 
is 
an 
obfuscating 
method 
in 
which 
the 
text 
of 
the 
message 
is 
stored 
as 
a 
GIF 
or 
JPEG 
image 
and 
displayed 
in 
the 
email.
-­‐Blank 
spam 
is 
spam 
lacking 
a 
payload 
advertisement. 
Often 
the 
message 
body 
is 
missing 
altogether, 
as 
well 
as 
the 
subject 
line.
-­‐Backscatter 
is 
a 
side-­‐effect 
of 
email 
spam, 
viruses 
and 
worms, 
where 
email 
servers 
receiving 
spam 
and 
other 
mail 
send 
bounce 
messages 
to 
an 
innocent 
party.
-­‐Install 
spam 
filtering/blocking 
software. 
-­‐Do 
not 
respond 
to 
suspicious 
emails 
. 
-­‐Set 
up 
a 
disposable 
email 
address 
. 
-­‐Create 
an 
email 
name 
that's 
tough 
to 
crack 
. 
-­‐View 
emails 
in 
plain 
text 
. 
-­‐Create 
a 
spam 
filter 
for 
your 
email 
. 
-­‐Do 
not 
post 
links 
to 
email 
addresses 
on 
web 
sites 
-­‐Watch 
out 
for 
those 
checked 
boxes 
-­‐Report 
spam
P12 r202t8 05-spam

Contenu connexe

Tendances

Machine Learning Project - Email Spam Filtering using Enron Dataset
Machine Learning Project - Email Spam Filtering using Enron DatasetMachine Learning Project - Email Spam Filtering using Enron Dataset
Machine Learning Project - Email Spam Filtering using Enron DatasetAman Singhla
 
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine LearningWeb Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learningbutest
 
A Survey: SMS Spam Filtering
A Survey: SMS Spam FilteringA Survey: SMS Spam Filtering
A Survey: SMS Spam Filteringijtsrd
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detectionPartnered Health
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingEditor IJCATR
 
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & AutomationIRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & AutomationIRJET Journal
 
3 Best Practices for Email Marketing
3   Best Practices for Email Marketing3   Best Practices for Email Marketing
3 Best Practices for Email MarketingFriday Explorer
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityChris Arrendale
 

Tendances (10)

E spam
E spamE spam
E spam
 
Email spam detection
Email spam detectionEmail spam detection
Email spam detection
 
Machine Learning Project - Email Spam Filtering using Enron Dataset
Machine Learning Project - Email Spam Filtering using Enron DatasetMachine Learning Project - Email Spam Filtering using Enron Dataset
Machine Learning Project - Email Spam Filtering using Enron Dataset
 
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine LearningWeb Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learning
 
A Survey: SMS Spam Filtering
A Survey: SMS Spam FilteringA Survey: SMS Spam Filtering
A Survey: SMS Spam Filtering
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detection
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
 
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & AutomationIRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & Automation
 
3 Best Practices for Email Marketing
3   Best Practices for Email Marketing3   Best Practices for Email Marketing
3 Best Practices for Email Marketing
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email Deliverability
 

Similaire à P12 r202t8 05-spam

E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Pinpointe On-Demand
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSAN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSijsrd.com
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxbartholomeocoombs
 
Email marketing terms
Email marketing termsEmail marketing terms
Email marketing termsxerprintec
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 

Similaire à P12 r202t8 05-spam (20)

E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
402 406
402 406402 406
402 406
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Spam
Spam Spam
Spam
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013
 
Web spam
Web spamWeb spam
Web spam
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSAN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
 
Email chap 2
Email chap 2Email chap 2
Email chap 2
 
E‑mail
E‑mailE‑mail
E‑mail
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
 
Email marketing terms
Email marketing termsEmail marketing terms
Email marketing terms
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 

Plus de Phannarith Ou, G-CISO

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computerPhannarith Ou, G-CISO
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your informationPhannarith Ou, G-CISO
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Phannarith Ou, G-CISO
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006Phannarith Ou, G-CISO
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterprisePhannarith Ou, G-CISO
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU StudentPhannarith Ou, G-CISO
 

Plus de Phannarith Ou, G-CISO (20)

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Reconnaisance
Reconnaisance Reconnaisance
Reconnaisance
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your information
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
 
Internet Security Policy - Khmer
Internet Security Policy - Khmer Internet Security Policy - Khmer
Internet Security Policy - Khmer
 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From Virus
 
How to Secure Your WiFi
How to Secure Your WiFiHow to Secure Your WiFi
How to Secure Your WiFi
 
Facebook Security in 3 Ways
Facebook Security in 3 Ways Facebook Security in 3 Ways
Facebook Security in 3 Ways
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Exchange Server 2003
Exchange Server 2003Exchange Server 2003
Exchange Server 2003
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development Proposal
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
ូUnderstanding DNS Spoofing
ូUnderstanding DNS SpoofingូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU Student
 
Heartbleed vulnerability
Heartbleed vulnerabilityHeartbleed vulnerability
Heartbleed vulnerability
 
P12 r202t8 04-d-dos
P12 r202t8 04-d-dosP12 r202t8 04-d-dos
P12 r202t8 04-d-dos
 

P12 r202t8 05-spam

  • 1. Group: 5 Ya Putheara Nem Sopheak Chamroeun Daro Kheiv Chanthy Oeurn Sophearith Lecturer : OU PHANNARITH
  • 2. -­‐Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email -­‐Spam email may also include malware as scripts or other executable file attachments.
  • 3. -­‐Email spam has steadily grown since the early 1990s. Botnets, networks of virus-­‐infected computers, are used to send about 80% of spam. Since the expense of the spam is borne mostly by the recipient, it is effectively postage due advertising. -­‐spam was declared to be legal by the CAN-­‐SPAM Act of 2003 provided the message adheres to certain specifications.
  • 4. Spam has several definitions varying by source. -­‐Unsolicited bulk email (UBE)—unsolicited email ,sent in large quantities. -­‐Unsolicited commercial email (UCE)—this more restrictive definition is used by regulators whose mandate is to regulate commerce, such as the U.S. Federal Trade Commission
  • 5. -­‐According to information compiled by Commtouch Software Ltd., email spam for the first quarter of 2010 can be broken down as follows. EMail Spam by Topic
  • 6.
  • 7. Appending: -­‐If a marketer has one database containing names, addresses, and telephone numbers of prospective customers, they can pay to have their database matched against an external database containing email addresses.
  • 8. -­‐Image spam, or Image-­‐based spam is an obfuscating method in which the text of the message is stored as a GIF or JPEG image and displayed in the email.
  • 9. -­‐Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, as well as the subject line.
  • 10. -­‐Backscatter is a side-­‐effect of email spam, viruses and worms, where email servers receiving spam and other mail send bounce messages to an innocent party.
  • 11. -­‐Install spam filtering/blocking software. -­‐Do not respond to suspicious emails . -­‐Set up a disposable email address . -­‐Create an email name that's tough to crack . -­‐View emails in plain text . -­‐Create a spam filter for your email . -­‐Do not post links to email addresses on web sites -­‐Watch out for those checked boxes -­‐Report spam