SlideShare ist ein Scribd-Unternehmen logo
1 von 20
SPAMMING AS CYBER CRIME
INTRODUCTION
• SPAM- Sending spam emails sent to a large
number of Internet users without their
consent
• VIRUS- A harmful program hiding in other
innocent programs
• CYBER CRIME- Crime that is committed on the
internet
DEFINITION
• SPAM is defined as an unsolicited, unwanted,
postings on social network websites or suspicious
emails sent to a large number of users.
• Social Spam is unwanted spam content appearing
on social network and any website with user-
generated content (comments, chat, etc.). It can
be manifested in many ways, including bulk
messages, profanity, insults, hate speech,
malicious links, fraudulent reviews, fake friends,
and personally identifiable information.
• Spammer- A person who creates electronic
spam is called a spammer
HISTORY
• The first major commercial spam incident began on
March 5, 1994.
• In a few years, the focus of spam (and anti-spam
efforts) has shifted primarily to electronic mail, where
it still resides today. It can be argued that aggressive
spam emails from various high profile spammers like
Sanford Wallace of Cyber Promotions in the mid to late
1990s helped make spam primarily an email
phenomenon in the public mind.
• In 2009, the majority of spam emails sent worldwide
were in English. Spammers have started using machine
translation services to send spam in other languages.
TYPES
• E-mail
• Instant Messaging
• Mobile Phones
• Social Networking Spam
• Social Spam
• Spam Targeting Video Sharing Sites
• Academic search
• Mobile Apps
E-MAIL
• Email Spam, also known as unsolicited bulk email
(UBE), spam, or unsolicited commercial email
(UCE), is the sending of unwanted email
messages, often with commercial content, in
large quantities. to a set of indiscriminate
recipients. Spam in e-mail began to become a
problem when the Internet was opened to the
general public in the mid-1990s. It has grown
exponentially in the following years and today
represents between 80 and 85%. of all emails in
the world. according to a “conservative estimate”.
INSTANT MESSAGING
• According to a report by Ferris Research, 500
million spam instant messages were sent in
2003, double the 2002 level. Instant
messaging is rarely blocked by firewalls,
making it a particularly useful channel for
spammers. . This is very common in many
instant messaging systems such as like Skype
MOBILE PHONES
• Mobile phone spam targets the text messaging service
of a mobile phone. This can be particularly irritating for
customers, not just for the inconveniences, but also for
the costs which can be invoiced by SMS received in
certain markets.
• The term "SpaSMS" was coined on the adnews Adland
website in 2000 to describe spam. To comply with CAN-
SPAM regulations in the United States, SMS messages
must now provide the HELP and STOP options, the
latter completely terminating communication with the
advertiser by SMS.
SOCIAL NETWORKING SPAM
• Facebook and Twitter are not immune to messages
containing spam links. Spammers hack into accounts and
send fake links disguised as the user's trusted contacts,
such as friends and family.
• As for Twitter, spammers gain credibility by following
verified accounts like Lady Gaga's; When the account
owner follows the spammer, they legitimize the spammer.
• Twitter has studied which structures of interest allow its
users to receive interesting tweets and avoid spam, despite
the fact that the site uses the delivery model, in which all of
a user's tweets are broadcast to all. user subscribers.
Spammers, with malicious intent, post unwanted (or
irrelevant) information or spread false information on social
media platforms.
SOCIAL SPAM
• Extending beyond centrally managed social
media platforms, user-generated content is
increasingly appearing on commercial,
government and non-profit websites around the
world.
• Fake accounts and comments entered by
computers programmed to send social spam can
infiltrate these websites.
• Well-meaning and malicious human users can
violate website policies by sending profanity,
slurs, hate speech and violent messages.
SPAM TARGETING VIDEO SHARING
SITES
• In actual video spam, the uploaded movie is given a name and description
with a popular figure or event likely to attract attention, or within the
video a certain image is programmed to appear as the video thumbnail
image to fool the user. viewer, such as a still image from a feature film,
pretending to be part by part of a pirated movie, eg. Big Buck Bunny Full
Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file
for a video game or something similar. The actual content of the video
ends up being totally alien, a Rickroll, offensive, or just a text on the
screen of a link to the site that is being promoted. In some cases, the link
in question may lead to an online survey site, a password-protected
archive file with instructions leading to the aforementioned survey
(although the survey, and the archive file itself, have no value and do not
contain the file in question), or in extreme cases, malware. Others may
upload videos presented in an infomercial-like format selling their product
featuring paid actors and testimonials, although the promoted product or
service is of questionable quality and would likely not pass the scrutiny of
a standards and practices department at a television station. or cable.
network
Screenshot from a spam video on
YouTube claiming that the film in
question has been deleted from the site,
and can only be accessed on the link
posted by the spambot in the video
description (if the video were actually
removed by YouTube, the description
would be inaccessible and the deletion
notification would look different)
ACADEMIC SEARCH
• Spam dexing refers to a World Wide Web practice of
modifying HTML pages to increase your chances of ranking
high in search engine relevance lists.
• These sites use “black hat” search engine optimization
techniques to deliberately manipulate their search engine
rankings. Many modern search engines have changed their
search algorithms to try to exclude the web pages that use
spam indexing tactics.
• For example, search bots will detect repeated keywords as
spam using grammar analysis. If it turns out that a website
owner spammed the website to falsely increase their page
ranking, the website may be penalized by the search
engines.
Mobile Apps
• Mobile Application Store spam includes
I. applications that have been generated
automatically and therefore have no specific
functionality or meaningful description.
II. the publication of several instances of the same
application to obtain greater visibility on the
application market.
III. applications that make excessive use of
unrelated keywords to attract users through
unwanted searches
SOLUTION
• There are different solutions to SPAM that you
can use, such as:
– Self solution
– White List Solutions
– Black List Solutions
– Software Solutions
– Heuristic Filters
– Content Filters
• Self solution
– The automatic solution implies that the user sees and eliminates
the SPAM in their mailbox.
– While it can be effective, it is time consuming and frustrating.
• Whitelist solution:
– Whitelists allow you to receive mail from senders in your
address book.
– Mail from senders who are not in your address book will be
stored in the spam folder.
– In some cases, mail from senders who are not in the address
book will be deleted.
• Blacklist solutions
– A blacklist contains domain names or email addresses of
companies called spammers.
– There is software available that helps you list known SPAM
domains or email addresses; these will be spammed or deleted.
• Software solution
– Software solutions have rules or are linked to Internet blacklists
– the software is usually installed on a computer or server.
– Examples of SPAM software solutions include BitDefender, Imail
or Mailwasher, ADWCleaner, ETC.
• Heuristic filters:
– A heuristic filter searches for characteristics, links, words and
phrases commonly used in SPAM.
– There are certain rules which are used in the program to
indicate whether the email is SPAM or not.
• Content Filters
– SPAM can also be indicated by the content of the email or web
page.
– Rules are used to decide whether the content is SPAM or not.
– The subject, attachments, headers, size and body content are
displayed to help decide if it is classified as SPAM
LAW AGAINST SPAMMING IN INDIA
PRESENTLY
• the Indian government has not yet enacted a
law that directly addresses the problem of
spam. The existing law in the form of the
Information Technology Act 2000 does not
contain any provision regarding the regulation
of spam, although it does regulate obscenity
covering the publication, transmission or
electronic publication of anything. material
that is obscene or that attracts obscene
people. to interest
CONCULSION
• SPAM is a long, frustrating and potentially
harmful Internet plug-in for your computer.
Take note of the ways to prevent SPAM from
cluttering your mailbox. At the same time,
make sure that your site is not seen as spam.

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Spam
Spam Spam
Spam
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Spam, security
Spam, securitySpam, security
Spam, security
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Ähnlich wie Spamming as cyber crime

Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Typeshirakhalid2394
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksAshish Arora
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Digital literacy edpc605
Digital literacy edpc605Digital literacy edpc605
Digital literacy edpc605Barbara M. King
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...Pedram Hayati
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ictsiewying
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 

Ähnlich wie Spamming as cyber crime (20)

Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Phishing
PhishingPhishing
Phishing
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Digital literacy edpc605
Digital literacy edpc605Digital literacy edpc605
Digital literacy edpc605
 
internet security
internet securityinternet security
internet security
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
Evaluation of Spam Detection and Prevention Frameworks for Email and Image Sp...
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 

Mehr von gagan deep

Transnational organized crime its concept
Transnational organized crime its conceptTransnational organized crime its concept
Transnational organized crime its conceptgagan deep
 
Theories of justice
Theories of justiceTheories of justice
Theories of justicegagan deep
 
The salient features of prevention of terrorism act, 2002
The salient features of prevention of terrorism act, 2002The salient features of prevention of terrorism act, 2002
The salient features of prevention of terrorism act, 2002gagan deep
 
The election of judges of international criminal court
The election of judges of international criminal courtThe election of judges of international criminal court
The election of judges of international criminal courtgagan deep
 
Summaries the article competence of two judge benches of supreme court to ref...
Summaries the article competence of two judge benches of supreme court to ref...Summaries the article competence of two judge benches of supreme court to ref...
Summaries the article competence of two judge benches of supreme court to ref...gagan deep
 
Specific crimes under icc
Specific crimes under iccSpecific crimes under icc
Specific crimes under iccgagan deep
 
Principle of complementarity
Principle of complementarityPrinciple of complementarity
Principle of complementaritygagan deep
 
Precedents concept and kinds
Precedents concept and kindsPrecedents concept and kinds
Precedents concept and kindsgagan deep
 
Law and legitimacy
Law and legitimacyLaw and legitimacy
Law and legitimacygagan deep
 
Internal aids of interpretation and construction of statutes
Internal aids of interpretation and construction of statutesInternal aids of interpretation and construction of statutes
Internal aids of interpretation and construction of statutesgagan deep
 
Fiscal technique
Fiscal techniqueFiscal technique
Fiscal techniquegagan deep
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collectiongagan deep
 
Drug trafficking and the role of ndps act in curbing the menace of organized ...
Drug trafficking and the role of ndps act in curbing the menace of organized ...Drug trafficking and the role of ndps act in curbing the menace of organized ...
Drug trafficking and the role of ndps act in curbing the menace of organized ...gagan deep
 
Difference between legal logic and legal rhetoric
Difference between legal logic and legal rhetoricDifference between legal logic and legal rhetoric
Difference between legal logic and legal rhetoricgagan deep
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
Vicarious liability under criminal law
Vicarious liability under criminal law Vicarious liability under criminal law
Vicarious liability under criminal law gagan deep
 
Type of research method are used
Type of research method are used Type of research method are used
Type of research method are used gagan deep
 
Trial process in uk
Trial process in ukTrial process in uk
Trial process in ukgagan deep
 
Rights of accused persons criminal law
Rights of accused persons criminal law Rights of accused persons criminal law
Rights of accused persons criminal law gagan deep
 
research Qualitative vs. quantitative research
research Qualitative vs. quantitative researchresearch Qualitative vs. quantitative research
research Qualitative vs. quantitative researchgagan deep
 

Mehr von gagan deep (20)

Transnational organized crime its concept
Transnational organized crime its conceptTransnational organized crime its concept
Transnational organized crime its concept
 
Theories of justice
Theories of justiceTheories of justice
Theories of justice
 
The salient features of prevention of terrorism act, 2002
The salient features of prevention of terrorism act, 2002The salient features of prevention of terrorism act, 2002
The salient features of prevention of terrorism act, 2002
 
The election of judges of international criminal court
The election of judges of international criminal courtThe election of judges of international criminal court
The election of judges of international criminal court
 
Summaries the article competence of two judge benches of supreme court to ref...
Summaries the article competence of two judge benches of supreme court to ref...Summaries the article competence of two judge benches of supreme court to ref...
Summaries the article competence of two judge benches of supreme court to ref...
 
Specific crimes under icc
Specific crimes under iccSpecific crimes under icc
Specific crimes under icc
 
Principle of complementarity
Principle of complementarityPrinciple of complementarity
Principle of complementarity
 
Precedents concept and kinds
Precedents concept and kindsPrecedents concept and kinds
Precedents concept and kinds
 
Law and legitimacy
Law and legitimacyLaw and legitimacy
Law and legitimacy
 
Internal aids of interpretation and construction of statutes
Internal aids of interpretation and construction of statutesInternal aids of interpretation and construction of statutes
Internal aids of interpretation and construction of statutes
 
Fiscal technique
Fiscal techniqueFiscal technique
Fiscal technique
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Drug trafficking and the role of ndps act in curbing the menace of organized ...
Drug trafficking and the role of ndps act in curbing the menace of organized ...Drug trafficking and the role of ndps act in curbing the menace of organized ...
Drug trafficking and the role of ndps act in curbing the menace of organized ...
 
Difference between legal logic and legal rhetoric
Difference between legal logic and legal rhetoricDifference between legal logic and legal rhetoric
Difference between legal logic and legal rhetoric
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Vicarious liability under criminal law
Vicarious liability under criminal law Vicarious liability under criminal law
Vicarious liability under criminal law
 
Type of research method are used
Type of research method are used Type of research method are used
Type of research method are used
 
Trial process in uk
Trial process in ukTrial process in uk
Trial process in uk
 
Rights of accused persons criminal law
Rights of accused persons criminal law Rights of accused persons criminal law
Rights of accused persons criminal law
 
research Qualitative vs. quantitative research
research Qualitative vs. quantitative researchresearch Qualitative vs. quantitative research
research Qualitative vs. quantitative research
 

Kürzlich hochgeladen

Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaYash
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理Fir La
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 

Kürzlich hochgeladen (20)

Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 

Spamming as cyber crime

  • 2. INTRODUCTION • SPAM- Sending spam emails sent to a large number of Internet users without their consent • VIRUS- A harmful program hiding in other innocent programs • CYBER CRIME- Crime that is committed on the internet
  • 3. DEFINITION • SPAM is defined as an unsolicited, unwanted, postings on social network websites or suspicious emails sent to a large number of users. • Social Spam is unwanted spam content appearing on social network and any website with user- generated content (comments, chat, etc.). It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.
  • 4. • Spammer- A person who creates electronic spam is called a spammer
  • 5. HISTORY • The first major commercial spam incident began on March 5, 1994. • In a few years, the focus of spam (and anti-spam efforts) has shifted primarily to electronic mail, where it still resides today. It can be argued that aggressive spam emails from various high profile spammers like Sanford Wallace of Cyber Promotions in the mid to late 1990s helped make spam primarily an email phenomenon in the public mind. • In 2009, the majority of spam emails sent worldwide were in English. Spammers have started using machine translation services to send spam in other languages.
  • 6. TYPES • E-mail • Instant Messaging • Mobile Phones • Social Networking Spam • Social Spam • Spam Targeting Video Sharing Sites • Academic search • Mobile Apps
  • 7. E-MAIL • Email Spam, also known as unsolicited bulk email (UBE), spam, or unsolicited commercial email (UCE), is the sending of unwanted email messages, often with commercial content, in large quantities. to a set of indiscriminate recipients. Spam in e-mail began to become a problem when the Internet was opened to the general public in the mid-1990s. It has grown exponentially in the following years and today represents between 80 and 85%. of all emails in the world. according to a “conservative estimate”.
  • 8. INSTANT MESSAGING • According to a report by Ferris Research, 500 million spam instant messages were sent in 2003, double the 2002 level. Instant messaging is rarely blocked by firewalls, making it a particularly useful channel for spammers. . This is very common in many instant messaging systems such as like Skype
  • 9. MOBILE PHONES • Mobile phone spam targets the text messaging service of a mobile phone. This can be particularly irritating for customers, not just for the inconveniences, but also for the costs which can be invoiced by SMS received in certain markets. • The term "SpaSMS" was coined on the adnews Adland website in 2000 to describe spam. To comply with CAN- SPAM regulations in the United States, SMS messages must now provide the HELP and STOP options, the latter completely terminating communication with the advertiser by SMS.
  • 10. SOCIAL NETWORKING SPAM • Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send fake links disguised as the user's trusted contacts, such as friends and family. • As for Twitter, spammers gain credibility by following verified accounts like Lady Gaga's; When the account owner follows the spammer, they legitimize the spammer. • Twitter has studied which structures of interest allow its users to receive interesting tweets and avoid spam, despite the fact that the site uses the delivery model, in which all of a user's tweets are broadcast to all. user subscribers. Spammers, with malicious intent, post unwanted (or irrelevant) information or spread false information on social media platforms.
  • 11. SOCIAL SPAM • Extending beyond centrally managed social media platforms, user-generated content is increasingly appearing on commercial, government and non-profit websites around the world. • Fake accounts and comments entered by computers programmed to send social spam can infiltrate these websites. • Well-meaning and malicious human users can violate website policies by sending profanity, slurs, hate speech and violent messages.
  • 12. SPAM TARGETING VIDEO SHARING SITES • In actual video spam, the uploaded movie is given a name and description with a popular figure or event likely to attract attention, or within the video a certain image is programmed to appear as the video thumbnail image to fool the user. viewer, such as a still image from a feature film, pretending to be part by part of a pirated movie, eg. Big Buck Bunny Full Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file for a video game or something similar. The actual content of the video ends up being totally alien, a Rickroll, offensive, or just a text on the screen of a link to the site that is being promoted. In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions leading to the aforementioned survey (although the survey, and the archive file itself, have no value and do not contain the file in question), or in extreme cases, malware. Others may upload videos presented in an infomercial-like format selling their product featuring paid actors and testimonials, although the promoted product or service is of questionable quality and would likely not pass the scrutiny of a standards and practices department at a television station. or cable. network
  • 13. Screenshot from a spam video on YouTube claiming that the film in question has been deleted from the site, and can only be accessed on the link posted by the spambot in the video description (if the video were actually removed by YouTube, the description would be inaccessible and the deletion notification would look different)
  • 14. ACADEMIC SEARCH • Spam dexing refers to a World Wide Web practice of modifying HTML pages to increase your chances of ranking high in search engine relevance lists. • These sites use “black hat” search engine optimization techniques to deliberately manipulate their search engine rankings. Many modern search engines have changed their search algorithms to try to exclude the web pages that use spam indexing tactics. • For example, search bots will detect repeated keywords as spam using grammar analysis. If it turns out that a website owner spammed the website to falsely increase their page ranking, the website may be penalized by the search engines.
  • 15. Mobile Apps • Mobile Application Store spam includes I. applications that have been generated automatically and therefore have no specific functionality or meaningful description. II. the publication of several instances of the same application to obtain greater visibility on the application market. III. applications that make excessive use of unrelated keywords to attract users through unwanted searches
  • 16. SOLUTION • There are different solutions to SPAM that you can use, such as: – Self solution – White List Solutions – Black List Solutions – Software Solutions – Heuristic Filters – Content Filters
  • 17. • Self solution – The automatic solution implies that the user sees and eliminates the SPAM in their mailbox. – While it can be effective, it is time consuming and frustrating. • Whitelist solution: – Whitelists allow you to receive mail from senders in your address book. – Mail from senders who are not in your address book will be stored in the spam folder. – In some cases, mail from senders who are not in the address book will be deleted. • Blacklist solutions – A blacklist contains domain names or email addresses of companies called spammers. – There is software available that helps you list known SPAM domains or email addresses; these will be spammed or deleted.
  • 18. • Software solution – Software solutions have rules or are linked to Internet blacklists – the software is usually installed on a computer or server. – Examples of SPAM software solutions include BitDefender, Imail or Mailwasher, ADWCleaner, ETC. • Heuristic filters: – A heuristic filter searches for characteristics, links, words and phrases commonly used in SPAM. – There are certain rules which are used in the program to indicate whether the email is SPAM or not. • Content Filters – SPAM can also be indicated by the content of the email or web page. – Rules are used to decide whether the content is SPAM or not. – The subject, attachments, headers, size and body content are displayed to help decide if it is classified as SPAM
  • 19. LAW AGAINST SPAMMING IN INDIA PRESENTLY • the Indian government has not yet enacted a law that directly addresses the problem of spam. The existing law in the form of the Information Technology Act 2000 does not contain any provision regarding the regulation of spam, although it does regulate obscenity covering the publication, transmission or electronic publication of anything. material that is obscene or that attracts obscene people. to interest
  • 20. CONCULSION • SPAM is a long, frustrating and potentially harmful Internet plug-in for your computer. Take note of the ways to prevent SPAM from cluttering your mailbox. At the same time, make sure that your site is not seen as spam.