Lesson4_Cybercrimes
Lesson4_Cybercrimes
Lesson 4
Cyber Crimes , Netiquettes
& Internet Threats
OVERVIEW
22
2. Use proper spelling, grammar and punctuation
Try not to use the cc: filed unless the recipient in the cc:
field knows why they are receiving a copy of the messages.
Internet Threats
Email Spam
Email spam, also known as junk email, is unsolicited
bulk messages sent through email. The use of spam has been
growing in popularity since the early 1990s and is a problem
faced by most email users. Recipients of spam often have
had their email addresses obtained by spambots, which are
automated programs that crawl the internet looking for
email addresses. Spammers use spambots to create email
distribution lists. A spammer typically sends an email to
millions of email addresses, with the expectation that only a
small number will respond or interact with the message.
Dangers on the Internet
The term spam is derived from a famous Monty Python sketch in
which there are many repetitive iterations of the Hormel canned meat
product. While the term spam was reportedly first used to refer to
unwanted email as early as 1978, it gained more widespread
currency in the early 1990s, as internet access became more common
outside of academic and research circles.
Email Spoofing