Agenda
description
Transcript of Agenda
![Page 1: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/1.jpg)
Clean Outthe Junk! Outsmarting
Unsolicited E-mail
NUIT Tech Talk Presentation
February 18, 2005
Sherry MintonDan Frommer
![Page 2: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/2.jpg)
AgendaAgenda
• Junk E-mail: What and why?• Blocking junk e-mail at the server
level: Northwestern’s new E-Mail Defense System
• Blocking junk e-mail locally using Outlook, Apple Mail, and Eudora
• Preventing junk e-mail
![Page 3: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/3.jpg)
Junk E-mail: What do we Junk E-mail: What do we mean?mean?
• Unsolicited e-mail advertisements
• Commonly called “spam”• Sent in mass mailings
![Page 4: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/4.jpg)
Junk E-mail: What do we Junk E-mail: What do we mean?mean?
• Usually in the form of advertisements
• Often inappropriate for work setting
• May also include malicious attachments, such as viruses, trojans, worms, and/or spyware
![Page 5: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/5.jpg)
The Prevalence of Junk E-The Prevalence of Junk E-mailmail
• Approximately 80% of e-mail transmitted is considered “junk”
• Of 169 million “online adults” in the United States, 78% receive junk e-mail on a daily basis
• Nearly half of those receive more than 10 junk e-mails per day
![Page 6: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/6.jpg)
One person’s trash…One person’s trash…• Americans spent a total of 1.2
billion hours deleting junk e-mail in 2004
• That equates to approximately $22 billion in lost productivity
• Does not include the toll on infrastructure and the cost of junk e-mail filtering software
![Page 7: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/7.jpg)
……another person’s treasureanother person’s treasure• 14% of American adults open
their junk e-mail to see what it is;
a solid ratio for sales “leads”• 4% (about 5 million people) made
purchases from junk e-mail ads in ‘04
![Page 8: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/8.jpg)
Clean Out the Clean Out the JunkJunk
Get Control of Junk E-mailServer-Side Junk E-mail FilteringNorthwestern’s “E-mail Defense
System”
![Page 9: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/9.jpg)
E-mail Defense System E-mail Defense System OverviewOverview
• New technology coming soon to Northwestern’s e-mail servers
• Scans for junk e-mail before reaching your computer
• Reduces junk e-mail that reaches your Inbox
• Deletes viruses before reaching your computer
![Page 10: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/10.jpg)
E-mail Defense System E-mail Defense System OverviewOverview
• Why implement a University-wide junk e-mail filter?
• 2004: 15 million junk e-mails at NU• Increasing popularity of Web mail,
which has no built-in filtering• Increasing threat of e-mail
transmitted viruses, which can paralyze even the strongest networks
![Page 11: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/11.jpg)
E-mail Defense SystemE-mail Defense System• Concerns before evaluation• Legality/Ethics: Ensure that server-
level filtering does not violate academic freedom
• Effectiveness: Both in terms of performance and value
• Universality: Applicable for all users, including handheld/PDA & Webmail
![Page 12: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/12.jpg)
E-mail Defense SystemE-mail Defense System• How it works• Scans e-mail messages “on their
way in” for viruses; if present, messages are deleted
• Assigns each message a “junk score”
• Depending on settings, quarantinese-mails marked as junk in special Web-accessible mailbox
![Page 13: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/13.jpg)
E-mail Defense SystemE-mail Defense System• How it works (continued)• Users receive daily e-mail listing
quarantined messages marked as highly probable junk
• Users can log in to a Web site with NU NetID/password and select marked messages, if any, to deliver to regular e-mail Inbox
![Page 14: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/14.jpg)
E-mail Defense SystemE-mail Defense System• How it works (continued)• Users can set personal choices,
such as blocking or accepting all e-mail from a certain sender or domain
• Messages from northwestern.edu are never considered to be junk e-mail unless the “from” address is spoofed
![Page 15: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/15.jpg)
E-mail Defense SystemE-mail Defense System• What to expect• Later this spring, the entire
University will be moved over to the E-mail Defense System
• Users may opt out at any time• System effective and easy to use:
93% of testers believed it would benefit the Northwestern community
![Page 16: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/16.jpg)
Clean Out the Clean Out the JunkJunk
Get Control of Junk E-mail
Client-Side Junk E-mail Filtering
![Page 17: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/17.jpg)
Client-Side Junk E-mail Client-Side Junk E-mail FilteringFiltering
• What is it?• Your e-mail software (Outlook,
Apple Mail, Eudora) scans incoming mail, applies pre-set “rules,” and filters junk from legitimate e-mail.
![Page 18: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/18.jpg)
Client-Side Junk E-mail Client-Side Junk E-mail FilteringFiltering
• How does it work?• Red flags include:
– Suspicious sender addresses: [email protected]
– Baad speelllinge, lot s of s p ac es, ALL CAPS FOR MILES
– Excessive! Use!! Of! Exclamations!!!– Your name in the subject line:
Hi Daniel, need a new mortgage?
![Page 19: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/19.jpg)
Client-Side Junk E-mail Client-Side Junk E-mail FilteringFiltering
• Why use it?• Saves time, cuts clutter;
less annoying than deleting manually
• Won’t load junk images that advertisers use to track your participation
• Can help prevent spread of viruses, infections attached to junk e-mails
![Page 20: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/20.jpg)
Client-Side Junk E-mail Client-Side Junk E-mail FilteringFiltering
• Common features:• Separate mailbox for junk e-mail• Automatic filtering and/or labeling• Customizable lists to “always allow”
or “always block” domains or people – Always allow: *@united.com– Always block: your-in-
![Page 21: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/21.jpg)
Junk E-mail Filtering: OutlookJunk E-mail Filtering: Outlook
Mailboxes
Options
![Page 22: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/22.jpg)
Junk E-mail Filtering: OutlookJunk E-mail Filtering: Outlook
Safe Senders
Add a safe sender
Helpful automation features:• Trust e-mail from Contacts• Add outgoing addresses to safe senders list
![Page 23: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/23.jpg)
Junk E-mail Filtering: Apple Junk E-mail Filtering: Apple MailMail
Safe Senders
Filtering Mode
![Page 24: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/24.jpg)
Junk E-mail Filtering: Apple Junk E-mail Filtering: Apple MailMail
Actions
Conditions
Advanced Settings Screen
![Page 25: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/25.jpg)
Junk E-mail Filtering: EudoraJunk E-mail Filtering: Eudora
Actions
Junk Threshold
Junk Mail Options
![Page 26: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/26.jpg)
Clean Out the Clean Out the JunkJunk
Get Control of Junk E-mail
Techniques for PreventingJunk E-mail
![Page 27: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/27.jpg)
Preventing Junk E-mailPreventing Junk E-mail• If you don’t know who an e-mail is
from, don’t even open it: just loading the images can tip off advertisers and increase junk e-mail sent to your account
• Use a second e-mail address (such as Yahoo or Hotmail) for online shopping, filling out Web forms, and non-NU e-mail lists
![Page 28: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/28.jpg)
Preventing Junk E-mailPreventing Junk E-mail• Don’t click “Remove” on junk e-mail
messages unless you trust the sender; it shows advertisers that you read their junk messages
• Avoid publicizing your NU e-mail address on the Web
• If necessary to post on the Web, hide your address using an image or script
![Page 29: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/29.jpg)
ResourcesResources• Get Control, NUIT’s Web Site for
computer security:www.it.northwestern.edu/getcontrol
• More information about NU’s new E-mail Defense System
• Instructions for setting up junk e-mail filters in popular e-mail clients
• Tips for preventing junk e-mail
![Page 30: Agenda](https://reader035.fdocuments.us/reader035/viewer/2022062807/568150fb550346895dbf1a48/html5/thumbnails/30.jpg)
Questions?Questions?• Next Tech Talk:
Stay Connected – Your Internet Connection Off-Campus
• Friday, March 11, 2005, Noon – 1 p.m.• Same locations – Evanston & Chicago• Please register online @
www.it.northwestern.edu• Thank you for attending!