Spamming for ecommerce student of college

Amuanpuia1 15 views 12 slides Aug 02, 2024
Slide 1
Slide 1 of 12
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12

About This Presentation

Spamming is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients for the purpose of commercial advertising, non-commercial proselytizing, or any prohibited purpose, or simply repeatedly sending the same message to the same user.


Slide Content

SPAMMING PRESENTED BY : LALLIANKIMA & ISAK VANLALMALSAWMDAWNGKIMA

INTRODUCTION : Spam is an electronic version of “junk mail” . The term spam refers to unsolicited , often unwanted , email messages . Spam does not necessarily contain viruses – valid messages from legitimate sources could fall into this category . Spamming is the use of messaging system to send multiple unsolicited messages to large number of recipients for the purpose of commercial advertising , for the purpose of non-commercial proselytising , for any prohibited purpose , simply repeatedly sending the same message to the same user . The most widely recognised form of spam is email spam . Spam can be used to spread computer viruses , trojan horses or other malicious software . The objective may identify theft , or worse . Some spam attempts to capitalize on human greed , while some attempts to take advantage of the victims inexperience with computer technology to trick them.

DIFFERENT KINDS OF SPAMMING : EMAIL SPAM : Email spam is surprisingly diverse . It runs the gamut from from mildly annoying to actively threatening to those who receive it , and even to other people who are on their contact list . Common examples of spam email are as follows : 1. PHISING : If you ever been contacted by a spammer posing as a legitimate person or business , you’ve been targeted in a phising attack . The goal is to convince you that the sender actually exists and that you will somehow benefit from sharing sensitive details such as your social security number or credit card information.

2. BAITING : Similar to phising , this strategy may be more alluring to targeted victims in that it comes with the promise of a reward . This could take the form of free downloads of subscription Many otherwise cautious users will happily give up sensitive information in exchage for such freebies . 3. ANTISPAM SPAM : This name might seem confusing , but the concept behind it is simple , many spammers claim to provide solutions that protect their target against other sources of spam . Instead , however , email recipients may be sent attachments containing viruses or links to dangerous pages .

COMMENT SPAM : If you’ve ever encountered an abundance of random, irrelevant comments on your website’s blog posts, the source could be a relentless comment spammer. This type of spam involves web-based forms, such as those found within blog-based comment sections or on community forums. Sometimes referred to as “ spomment ,” comment spam typically involves some sort of reply that is obviously irrelevant to a given blog or forum thread’s main topic, as well as a link that leads to the spammer’s website. Comment spam can also involve social media platforms, where it strikes the comment sections for photo and video uploads, as well as simple status updates. With social media, spam can find its way onto private individual pages and groups, along with business-oriented pages and even advertising initiatives.

MESSENGER SPAM : Similar in many respect to type of spam linked to email , messenger spam directly strikes messaging services on website such as Facebook , Instagram , and Linkedin . These spam messages can often be categorized similarly to the most common spam emails . They may be more difficult to filter , however , and are more likely to reach users who spend more time on social media than checking their email inboxes . Phising and baiting are particularly common , with some messeges also may infect computers or mobile devices . Some may even cause Facebook friends and followers to receive unwanted or downright dangerous messages .

BROWSER SPAM : Although less common than email or messenger-oriented types of spam, browser spam strikes far too many unsuspecting users. These scams draw on the increasing popularity of browser notifications, which, when used properly, can streamline digital interactions to limit the need for open tabs. Unfortunately, these can also be manipulated to create significant security threats. Unfamiliar to many targets, this type of spam involves browser notifications, which trick recipients into subscribing to problematic websites. These bombard users with notifications related to unsavory schemes. Many of today’s top computer and mobile security solutions are incapable of detecting and eradicating these notifications, so they are often able to continue unchecked.

HOW TO REDUCE THE AMOUNT OF SPAM : 1. BE CAREFUL ABOUT RELEASING YOUR EMAIL ADDRESS : Think twice before you respond to any request for your email address, on the web, verbally, or on paper. Spammers can harvest any email address posted on a website. If you give your email address to a company, that information is often entered into a database so that customer information and preferences can be tracked. If these email databases are sold to or shared with other companies, you can receive email that you didn't request. 2. CHECK PRIVACY POLICIES : Before submitting your email address online, look for a privacy policy. Most reputable sites will have a link to their privacy policy from any form where you're asked to submit personal data. You should read this policy before submitting your email address or any other personal information so that you know what the owners of the site plan to do with the information .

3 . BE AWARE OF OPTIONS SELECTED BY DEFAULT : When you sign up for some online accounts or services, there may be a section that provides you with the option to receive email about other products and services. Sometimes there are options selected by default, so if you do not deselect them, you could begin to receive email from those lists as well. 4 .REPORT MESSAGE AS SPAM : Most email clients offer an option to report a message as spam or junk. If your email client has that option, take advantage of it. Reporting messages as spam or junk helps to train the mail filter so that the messages aren't delivered to your inbox. However, check your junk or spam folders occasionally to look for legitimate messages that were incorrectly classified as spam.

5 . USE PRIVACY SETTINGS ON SOCIAL NETWORKING SITES : Social networking sites typically allow you to choose who has access to see your email address. Consider hiding your email account or changing the settings so that only a small group of people that you trust are able to see your address . Know that when you use applications on these sites, you may be granting permission for them to access your personal information. So, be cautious about which applications you choose to use. 6 . DON’T SPAM OTHER PEOPLE : Be a responsible and considerate user. Some people consider email forwards a type of spam, so be selective with the messages you redistribute. Don't forward every message to everyone in your address book, and if recipients ask that you not forward messages to them, respect their requests.

PENALTIES FOR SPAMMING & HOW TO REPORT SPAMMING For criminal penalties, the Act provides for imprisonment of up to five years for accessing someone else’s computer to send spam without permission, using false information to register for multiple email accounts or domain names, relaying or retransmitting multiple spam messages through a computer to mislead others about the origin of the message, or harvesting email addresses or generating them through a dictionary attack. If you believe you’ve received a spam email violating the CAN-SPAM Act, you can report it to the Federal Trade Commission (FTC). The FTC has an online complaint assistant where you can provide details about the spam email. Additionally, forwarding the spam email to the FTC can aid their investigations.

THANK YOU
Tags