Title: PowerPoint Template
1BCM
E-Business Technologies
SPAM
Rafael Quiroz Vázquez Professor Eduard Heindl
2Agenda
- Definition
- History
- How does spam work?
- Categories
- Laws
- Where is spam?
- Battle against spam
- Spam every day
Rafael Quiroz Vázquez
3Definition
- Spam is the abuse of sending unauthorized and
inappropriate bulk messages - It is sent to a lot of people
- It is normally advertisement or promotional
- It is not requested by the addresser.
Rafael Quiroz Vázquez
4History
- The name comes from USA (30s).
- It was the name of a can which contains meat.
- British Band popularized the term spam.
- The spam became popular in the 90s.
- Nowadays, spam continues increasing.
Rafael Quiroz Vázquez
5How does spam work
- Spammers need the e-mail addresses
- There are several ways to get the addresses
- They have tools that allow them create virus and
control the computers of the web-users. - They are hired by big companies to make
advertisements of their products
Rafael Quiroz Vázquez
6Phising and scam
- Phising is type of deception designed to steal
your valuable personal data - 1.- Fake web site that accepts donations for
charity. - 2.- Social network site of the web-user
- 3.- Fake e-mail message of the co-workers or
web-user. - These kind of spam comes from fake reliable
web-sites for the web-user, they are called scam.
Rafael Quiroz Vázquez
7Categories
Rafael Quiroz Vázquez
8Categories
Rafael Quiroz Vázquez
9Laws
Governments should organize and decide which is
the best way to control the flow of the
iformation through the net. Every government
stablish its own rules, the problem is that once
a spam is created in any part of the world it can
be trasmited to any computer in another
country. Therefore the governments should make
an agreement to improvise the performance
against the spam.
Rafael Quiroz Vázquez
10Laws
Rafael Quiroz Vázquez
11Where is spam?
- E-mail
- Forums
- Blog
- Social networks
- Mobile
- Internet Relay Chat
Rafael Quiroz Vázquez
12Battle against spam
- Four groups
- End-user technique
- Automated techniques for e-mail administrator
- Filtering techniques
- Automated techniques for e-mail senders
Rafael Quiroz Vázquez
13Spam every day
Rafael Quiroz Vázquez
14Reference
Spam data (2009). Retrieved June 29, 2009 from
http//www.barracudacentral.org/about Spam data
(2009). Retrieved June 29, 2009 from
http//www.barracudacentral.org/index.cgi?pspam P
eraldo Lorenzo, (2008). Anti-spam techniques
Retrieved June 25, 2009 from http//en.wikipedia.o
rg/wiki/Spam_(electronic) Obligaciones de
información sobre la seguridad. (2008) Retrieved
June 21, 2009 from http//www.lssi.es/Secciones/Co
ntenidos/Obligaciones/contprin2e.htm Harris
David. (2003). Spam, the curse of the new
millennium an overview and white paper. The
state of spam (n. d.) Retrieved June 28, 2009
from http//www.symantec.com/avcenter/reference/Sy
mantec_Spam_Report_-_February_2007.pdf The
definition of spam (n.d.). Retrieved June 12,
2009 from http//www.spamhaus.org/definition.html
How does spam work (n. d.) Retrieved June 13,
2009 from http//www.nolo.com/article.cfm/objectId
/A6F26AE8-C831-469E-81157FC4252D98CB/104/284/220/A
RT/ Tipos de spam (2009) Retrieved June 28,
2009 from http//www.viruslist.com/sp/spam/info?ch
apter153350533 Recognize phishing scams and
fraudulent e-mail (n. d.) Retrieved June 14, 2009
from http//www.microsoft.com/protect/yourself/phi
shing/identify.mspx Recognize phishing scams and
fraudulent e-mail (n. d.) Retrieved June 14, 2009
from http//www.microsoft.com/spain/empresas/aseso
ria/scam.mspx
15Thank you