virusesssssssssssssssssssssssssssss.pptx

minsatt32 6 views 20 slides Aug 07, 2024
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

Computer Viruses


Slide Content

University of Computer Studies (Magway) ​ Ethics In Information Technology (CST - 3213) Ethical Issues Related with Spam Supervised by: U Zaw Win Myint  Presented by: Group_4 Ma Mya Hmue Thwe UCSMG_19084 Ma Khin Myat Mon UCSMG_19087 Ma Wai Zin Oo UCSMG_19102 Ma Phyo Ei San UCSMG_19093 Ma Chit Su Kyaw UCSMG_19197 Ma Pan Yoon San Eain UCSMG_18 202

Outlines

Objectives The objectives of this report are: To understand the nature of spam To know the various types of spam To protect againsts phishing ,malware and other cyber threats often delivered through spam To enhance email filtering systems to reduce the amount of spam that reaches users To know how to fight spam

Spam definition What is spam? Unsolicited: Sent without the recipient's consent. Mass Distribution: Sent to a large number of recipients simultaneously. Irrelevant Content: Often not relevant to the recipient's interests or needs. Common Forms: It typically includes emails, but can also encompass text messages, social media posts, and comments. Potentially Harmful: Can include links to phishing sites, malware, or scams.

Why is it called Spam? Monty Python Sketch: Originates from a 1970 sketch where "spam" (the canned meat) is mentioned repeatedly. Annoyance Factor: In the sketch, "spam" is used annoyingly and excessively, similar to unwanted messages. Adoption by Internet Users: Early internet users adopted the term to describe the intrusive and repetitive nature of unsolicited emails and messages.

Types Of Spam

Spam Email Unsolicited, often irrelevant or inappropriate messages sent over email to a large number of recipients. First spam email sent in 1978. Evolved with the rise of the internet and email usage. Characteristics of Spam Emails Unsolicited: Received without prior consent. Mass Distribution: Sent to large groups of people. Commercial Intent: Often promoting products, services, or scams. Spam Email

SEO Spam SEO spam refers to unethical practices used to manipulate search engine rankings, often by violating search engine guidelines to achieve higher visibility in search results. Developed with the rise of search engines and SEO. Initially used to exploit loopholes in search algorithms for ranking advantages. Characteristics of SEO Spam Manipulative Techniques: Employs deceptive methods to improve rankings artificially. Violation of Search Engine Guidelines: Methods often go against search engine policies and best practices. Short-Term Gains: Aimed at achieving quick improvements in search engine rankings without long-term sustainability. SEO Spam

Content spam refers to the deliberate insertion of irrelevant, low-quality, or misleading content into online platforms, including websites, forums, and social media, to manipulate or exploit search engine algorithms or mislead users. Emerged with the growth of the internet and search engines. Aimed at gaming search engine algorithms to gain higher rankings. Characteristics of Content Spam Low-Quality Content: Often lacks substance and value. Keyword Stuffing: Excessive use of keywords to manipulate search engine rankings. Duplicate Content: Repeating the same content across multiple sites or pages. Content Spam

Link Spam Link spam is the practice of posting irrelevant, excessive, or misleading links on websites or social media to drive traffic, manipulate search engine results, or spread malicious content.

Social media spam Social media spam is the posting of unsolicit Social media spam is the posting of unsolicited, irrelevant, or repetitive content on social media platforms, often for promotional or malicious purposes, which can clutter user feeds and degrade platform quality.ed, irrelevant, or repetitive content on social media platforms, often for promotional or malicious purposes, which can clutter user feeds and degrade platform quality.

Spam Text Message and Spam Calls

Tech Support Scams A tech support scam is a type of fraud where scammers pose as technical support representatives from reputable companies to trick you into paying for unnecessary services or giving them access to your personal information.

Current events scams are fraudulent schemes that exploit recent news, trends, or significant events to deceive people. Scammers use these events to create a sense of urgency or legitimacy, making their scams more convincing. Malware spam, often called malspam , is a type of spam email that contains malicious software as its payload. Current events scams Malware Spam

Why Spam is evil? Spam can be considered "evil" for several reasons: Security Risks: Spam often includes malicious links or attachments that can lead to phishing attacks, malware infections, or identity theft. Privacy Violations: Spammers may harvest email addresses and other personal information without consent, infringing on privacy. Resource Drain: Spam wastes valuable resources such as storage space, bandwidth, and processing power for both individuals and organizations. Productivity Loss: The time spent dealing with spam, including sorting and deleting unwanted messages, can reduce productivity and distract from more important tasks. Erosion of Trust: Persistent spam can erode trust in electronic communications, making users more skeptical of legitimate messages. Beyond the annoyance and the time wasted sifting through unwanted messages, spam can cause significant harm by infecting users’ computers with malicious software capable of damaging systems and stealing personal information. It also can consume network resources.

How does Spam work? Spam is rarely sent directly by a company advertising itself. It's usually sent by a "spammer". An advertiser enters into an agreement with a spammer. The cost of spam is far less than postal bulk mailings. How do spammers find you? Sometimes they might buy your address or they obtain them by using software programs known as "harvesters". Here's a brief overview of how it works: Collection of Addresses Sending the Spam Content of the message Avoiding detection Monetization. Spam can distribute through various methods: Email Spam ,Social media spam, Web spam, SMS spam, Instant Messaging Spam

Spam users

How to fight Spam?

Conclusion Summary: Diverse spam users, motives, and ethical boundaries. Defense Strategies: Advanced filters, security tools, proactive culture. Ongoing Education: Stay informed on evolving spam tactics. Collective Effort: Importance of individual and organizational vigilance. Further Resources: Websites, books, organizations for spam prevention.

Thanks