SlideShare uma empresa Scribd logo
1 de 9
Spam- What is it?
• Spam is the use
  of electronic
  messaging
  systems to send
  unsolicited bulk
  messages
  indiscriminately.
Spam- Brief History
• Spam infiltrated
  the public in the
  technology
  boom.
• Businesses used
  spam as a
  business tactic to
  increase
  popularity.
Spam- Business
• Spam, in the
  business world, is
  considered to be
  highly
  unprofessional in
  most industries.
• Costs businesses
  millions of dollars
  to combat
Spam- Public
• Spam also costs
  individuals across
  the world millions
  of dollars to combat
  their personal e-
  mails.
• Some view spam as
  an invasion of
  privacy.
Spam- Public
• Spam can also
  expose unwilling
  individuals, such as
  children, to
  inappropriate web
  content.
• Parents have to
  spend money for
  parental controls.
Spam- Future
• The future of spam is       NOT THIS KIND OF SPAM

  unknown.
• There have been
  several acts and
  legislation set in place.
• The infiltration of         THIS KIND OF SPAM!!!!
  spam could change
  how the public uses
  the internet forever.
Spam presentation
Spam presentation

Mais conteúdo relacionado

Mais procurados

M&P Mobile Presentation
M&P Mobile PresentationM&P Mobile Presentation
M&P Mobile Presentationguest77abea0
 
Lesson 4 bridging the generation gap
Lesson 4 bridging the generation gapLesson 4 bridging the generation gap
Lesson 4 bridging the generation gapRosarah Nemo
 
Bridging the Generation Gap
Bridging the Generation GapBridging the Generation Gap
Bridging the Generation GapJoanne Suan
 
6329 r campachapter1
6329 r campachapter16329 r campachapter1
6329 r campachapter1rocam98
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyAlec Couros
 
Technology creates social isolation and neurosis by hardilmohit singh
Technology creates social isolation and neurosis by hardilmohit singhTechnology creates social isolation and neurosis by hardilmohit singh
Technology creates social isolation and neurosis by hardilmohit singhHardilmohit Singh
 
#IoT and the internet of me #ai #blockchain Talk april 2018
#IoT and the internet of me #ai #blockchain Talk april 2018#IoT and the internet of me #ai #blockchain Talk april 2018
#IoT and the internet of me #ai #blockchain Talk april 2018Dr. Julie Albright
 
Post industrial information technology
Post industrial information technologyPost industrial information technology
Post industrial information technologyPeterus Balan
 
PPSB-MASS MEDIA-COMPARATIVE STUDY
PPSB-MASS MEDIA-COMPARATIVE STUDYPPSB-MASS MEDIA-COMPARATIVE STUDY
PPSB-MASS MEDIA-COMPARATIVE STUDYMINDBOGGLERS
 
The Role of Libraries in a Transliterate World
The Role of Libraries in a Transliterate WorldThe Role of Libraries in a Transliterate World
The Role of Libraries in a Transliterate WorldBobbi Newman
 
Evolution of technology presentation ppt
Evolution of technology presentation pptEvolution of technology presentation ppt
Evolution of technology presentation pptArihantPatil8
 
How Do We Know
How Do We KnowHow Do We Know
How Do We KnowPat Sine
 
Digital divide and the economy
Digital divide and the economyDigital divide and the economy
Digital divide and the economyHeather Marie
 
Generational Issues and Distance Learning
 Generational Issues and Distance Learning Generational Issues and Distance Learning
Generational Issues and Distance LearningKathleen L. Gordon
 

Mais procurados (18)

M&P Mobile Presentation
M&P Mobile PresentationM&P Mobile Presentation
M&P Mobile Presentation
 
Lesson 4 bridging the generation gap
Lesson 4 bridging the generation gapLesson 4 bridging the generation gap
Lesson 4 bridging the generation gap
 
Sipa
SipaSipa
Sipa
 
Bridging the Generation Gap
Bridging the Generation GapBridging the Generation Gap
Bridging the Generation Gap
 
6329 r campachapter1
6329 r campachapter16329 r campachapter1
6329 r campachapter1
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
 
Technology creates social isolation and neurosis by hardilmohit singh
Technology creates social isolation and neurosis by hardilmohit singhTechnology creates social isolation and neurosis by hardilmohit singh
Technology creates social isolation and neurosis by hardilmohit singh
 
#IoT and the internet of me #ai #blockchain Talk april 2018
#IoT and the internet of me #ai #blockchain Talk april 2018#IoT and the internet of me #ai #blockchain Talk april 2018
#IoT and the internet of me #ai #blockchain Talk april 2018
 
Post industrial information technology
Post industrial information technologyPost industrial information technology
Post industrial information technology
 
ES_ 10 Author-Gottumutkala Sai Bhavani
ES_ 10 Author-Gottumutkala Sai BhavaniES_ 10 Author-Gottumutkala Sai Bhavani
ES_ 10 Author-Gottumutkala Sai Bhavani
 
PPSB-MASS MEDIA-COMPARATIVE STUDY
PPSB-MASS MEDIA-COMPARATIVE STUDYPPSB-MASS MEDIA-COMPARATIVE STUDY
PPSB-MASS MEDIA-COMPARATIVE STUDY
 
The Role of Libraries in a Transliterate World
The Role of Libraries in a Transliterate WorldThe Role of Libraries in a Transliterate World
The Role of Libraries in a Transliterate World
 
Evolution of technology presentation ppt
Evolution of technology presentation pptEvolution of technology presentation ppt
Evolution of technology presentation ppt
 
Tech tools task
Tech tools taskTech tools task
Tech tools task
 
How Do We Know
How Do We KnowHow Do We Know
How Do We Know
 
Digital divide and the economy
Digital divide and the economyDigital divide and the economy
Digital divide and the economy
 
Generational Issues and Distance Learning
 Generational Issues and Distance Learning Generational Issues and Distance Learning
Generational Issues and Distance Learning
 
Power of social media
Power of social mediaPower of social media
Power of social media
 

Semelhante a Spam presentation

Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Typeshirakhalid2394
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crimegagan deep
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetejNishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttwNishaTariq1
 
Dark side of it and cyber crime
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crimePuja Dhakal
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimessweta dargad
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environmentJeet Kothadiya
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...Egyptian Engineers Association
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetSai Sreeram
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Sciencemissstevenson01
 

Semelhante a Spam presentation (20)

Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crime
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
Spam
SpamSpam
Spam
 
part 3 cyber crimes
part 3 cyber crimes part 3 cyber crimes
part 3 cyber crimes
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Spam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a ThreatSpam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a Threat
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Dark side of it and cyber crime
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crime
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Science
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Spam presentation

  • 1.
  • 2. Spam- What is it? • Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately.
  • 3. Spam- Brief History • Spam infiltrated the public in the technology boom. • Businesses used spam as a business tactic to increase popularity.
  • 4. Spam- Business • Spam, in the business world, is considered to be highly unprofessional in most industries. • Costs businesses millions of dollars to combat
  • 5. Spam- Public • Spam also costs individuals across the world millions of dollars to combat their personal e- mails. • Some view spam as an invasion of privacy.
  • 6. Spam- Public • Spam can also expose unwilling individuals, such as children, to inappropriate web content. • Parents have to spend money for parental controls.
  • 7. Spam- Future • The future of spam is NOT THIS KIND OF SPAM unknown. • There have been several acts and legislation set in place. • The infiltration of THIS KIND OF SPAM!!!! spam could change how the public uses the internet forever.