Spamming as cyber crime

1,796 views 20 slides Feb 06, 2022
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

Spamming as cyber crime
Cyber laws


Slide Content

SPAMMING AS CYBER CRIME

INTRODUCTION SPAM- Sending spam emails sent to a large number of Internet users without their consent VIRUS- A harmful program hiding in other innocent programs CYBER CRIME- Crime that is committed on the internet

DEFINITION SPAM is defined as an unsolicited, unwanted, postings on social network websites or suspicious emails sent to a large number of users. Social Spam is unwanted spam content appearing on social network and any website with user-generated content (comments, chat, etc.). It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information .

Spammer- A person who creates electronic spam is called a spammer

HISTORY The first major commercial spam incident began on March 5, 1994 . In a few years, the focus of spam (and anti-spam efforts) has shifted primarily to electronic mail, where it still resides today. It can be argued that aggressive spam emails from various high profile spammers like Sanford Wallace of Cyber Promotions in the mid to late 1990s helped make spam primarily an email phenomenon in the public mind. In 2009, the majority of spam emails sent worldwide were in English. Spammers have started using machine translation services to send spam in other languages.

TYPES E-mail Instant Messaging Mobile Phones Social Networking Spam Social Spam Spam Targeting Video Sharing Sites Academic search Mobile Apps

E-MAIL Email Spam , also known as unsolicited bulk email (UBE), spam, or unsolicited commercial email (UCE), is the sending of unwanted email messages, often with commercial content, in large quantities. to a set of indiscriminate recipients. Spam in e-mail began to become a problem when the Internet was opened to the general public in the mid-1990s. It has grown exponentially in the following years and today represents between 80 and 85%. of all emails in the world. according to a “conservative estimate”.

INSTANT MESSAGING According to a report by Ferris Research, 500 million spam instant messages were sent in 2003, double the 2002 level. Instant messaging is rarely blocked by firewalls, making it a particularly useful channel for spammers. . This is very common in many instant messaging systems such as like Skype

MOBILE PHONES Mobile phone spam targets the text messaging service of a mobile phone. This can be particularly irritating for customers, not just for the inconveniences, but also for the costs which can be invoiced by SMS received in certain markets. The term " SpaSMS " was coined on the adnews Adland website in 2000 to describe spam. To comply with CAN-SPAM regulations in the United States, SMS messages must now provide the HELP and STOP options, the latter completely terminating communication with the advertiser by SMS.

SOCIAL NETWORKING SPAM Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send fake links disguised as the user's trusted contacts, such as friends and family. As for Twitter, spammers gain credibility by following verified accounts like Lady Gaga's ; When the account owner follows the spammer, they legitimize the spammer. Twitter has studied which structures of interest allow its users to receive interesting tweets and avoid spam, despite the fact that the site uses the delivery model, in which all of a user's tweets are broadcast to all. user subscribers. Spammers, with malicious intent, post unwanted (or irrelevant) information or spread false information on social media platforms.

SOCIAL SPAM Extending beyond centrally managed social media platforms, user-generated content is increasingly appearing on commercial, government and non-profit websites around the world. Fake accounts and comments entered by computers programmed to send social spam can infiltrate these websites. Well-meaning and malicious human users can violate website policies by sending profanity, slurs, hate speech and violent messages.

SPAM TARGETING VIDEO SHARING SITES In actual video spam, the uploaded movie is given a name and description with a popular figure or event likely to attract attention, or within the video a certain image is programmed to appear as the video thumbnail image to fool the user. viewer, such as a still image from a feature film, pretending to be part by part of a pirated movie, eg . Big Buck Bunny Full Movie Online - Part 1/10 HD, a link to a supposed keygen , trainer, ISO file for a video game or something similar. The actual content of the video ends up being totally alien, a Rickroll , offensive, or just a text on the screen of a link to the site that is being promoted. In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions leading to the aforementioned survey (although the survey, and the archive file itself, have no value and do not contain the file in question), or in extreme cases, malware. Others may upload videos presented in an infomercial-like format selling their product featuring paid actors and testimonials, although the promoted product or service is of questionable quality and would likely not pass the scrutiny of a standards and practices department at a television station. or cable. network

Screenshot from a spam video on YouTube claiming that the film in question has been deleted from the site, and can only be accessed on the link posted by the spambot in the video description (if the video were actually removed by YouTube, the description would be inaccessible and the deletion notification would look different)

ACADEMIC SEARCH Spam dexing refers to a World Wide Web practice of modifying HTML pages to increase your chances of ranking high in search engine relevance lists. These sites use “black hat” search engine optimization techniques to deliberately manipulate their search engine rankings. Many modern search engines have changed their search algorithms to try to exclude the web pages that use spam indexing tactics. For example, search bots will detect repeated keywords as spam using grammar analysis. If it turns out that a website owner spammed the website to falsely increase their page ranking, the website may be penalized by the search engines.

Mobile Apps Mobile Application Store spam includes applications that have been generated automatically and therefore have no specific functionality or meaningful description. the publication of several instances of the same application to obtain greater visibility on the application market. applications that make excessive use of unrelated keywords to attract users through unwanted searches

SOLUTION There are different solutions to SPAM that you can use, such as : Self solution White List Solutions Black List Solutions Software Solutions Heuristic Filters Content Filters

Self solution The automatic solution implies that the user sees and eliminates the SPAM in their mailbox. While it can be effective, it is time consuming and frustrating . Whitelist solution: Whitelists allow you to receive mail from senders in your address book. Mail from senders who are not in your address book will be stored in the spam folder . In some cases, mail from senders who are not in the address book will be deleted. Blacklist solutions A blacklist contains domain names or email addresses of companies called spammers. There is software available that helps you list known SPAM domains or email addresses; these will be spammed or deleted.

Software solution Software solutions have rules or are linked to Internet blacklists the software is usually installed on a computer or server . Examples of SPAM software solutions include BitDefender , Imail or Mailwasher , ADWCleaner , ETC. Heuristic filters: A heuristic filter searches for characteristics, links, words and phrases commonly used in SPAM . There are certain rules which are used in the program to indicate whether the email is SPAM or not. Content Filters SPAM can also be indicated by the content of the email or web page. Rules are used to decide whether the content is SPAM or not . The subject, attachments, headers, size and body content are displayed to help decide if it is classified as SPAM

LAW AGAINST SPAMMING IN INDIA PRESENTLY the Indian government has not yet enacted a law that directly addresses the problem of spam. The existing law in the form of the Information Technology Act 2000 does not contain any provision regarding the regulation of spam, although it does regulate obscenity covering the publication, transmission or electronic publication of anything. material that is obscene or that attracts obscene people. to interest

CONCULSION SPAM is a long, frustrating and potentially harmful Internet plug-in for your computer. Take note of the ways to prevent SPAM from cluttering your mailbox. At the same time, make sure that your site is not seen as spam.