A Tool for Evaluating Spam Filters

Total Page:16

File Type:pdf, Size:1020Kb

A Tool for Evaluating Spam Filters UNIVERSITY OF CALGARY SpamTestSim: A Tool For Evaluating Spam Filters by Nathan Mark Friess A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE CALGARY, ALBERTA January, 2009 c Nathan Mark Friess 2009 ISBN: 978-0-494-51104-6 Abstract This thesis describes a new framework for evaluating spam filters: SpamTestSim. Spam- TestSim is a simulator that employs a multi-agent system, where agents simulate both legitimate email users and spammers. Agents send email messages to each other, as well as reply to and forward the messages between each other. These messages are then fed through a real mail server running a spam filter, with the goal of identifying weaknesses in the filter. This thesis also focuses on two important sub-topics of the overall simulator: the construction of the social network of agents, and a new approach to gathering non-spam text for the agents to use in the simulation. Finally, Spam- TestSim is compared to another well-known spam filter evaluation framework, and a selection of those results are presented here. One notable experiment demonstrates the advantage of using SpamTestSim over the other framework in uncovering weaknesses in two different spam filters. iii Acknowledgements I would like to thank my supervisor, Dr. John Aycock, for his guidance and his continual patience throughout my studies, especially during the writing phase. I would also like to thank my friends at Lyryx for their suggestions on the small but important writing technicalities, as well as their moral support during my studies. Finally, I’d like to thank Chris Walpole for his encouragement and insights about school and life in general. iv Table of Contents ApprovalPage ................................... ii Abstract....................................... iii Acknowledgements ................................. iv TableofContents.................................. v ListofTables .................................... vii ListofFigures....................................viii ListofCodeListings ................................ ix 1 Introduction.................................. 1 1.1 Definitions............................... 3 1.2 Motivation............................... 7 1.3 Multi-AgentSystems ......................... 10 1.4 ThesisOutline............................. 13 2 RelatedWork ................................. 14 2.1 Overview ............................... 14 2.2 Current Evaluation Techniques . 15 2.3 DistributedTesting.......................... 18 2.4 TestingTheory ............................ 18 2.5 Alternative Evaluation Techniques . 20 2.6 Summary ............................... 23 3 SpamTestSim ................................. 24 3.1 SimulationPhases .......................... 25 3.2 UnderlyingInfrastructure . 28 3.3 Agents................................. 29 3.3.1 BaseAgent.......................... 29 3.3.2 SpamAgent ......................... 35 3.3.3 MailingListAgent. .. .. 36 3.3.4 HamAgent ......................... 37 3.4 Summary ............................... 41 4 GeneratingSocialNetworks . .. .. 42 4.1 BasicSocialNetworkGeneration . 42 v 4.2 SocialNetworksOverTimeZones . 45 4.3 ThemultiTzOrgAlgorithm . 47 4.4 TheindepOrgAlgorithm. .. .. 49 4.5 Study Of The Scale-Free Property Of indepOrg And multiTzOrg . 52 4.6 AnomalyInTheBasicAlgorithm . 54 4.7 Summary ............................... 57 5 Building A Ham Corpus From Usenet . 59 5.1 Experiments.............................. 60 5.1.1 CustomNewsgroupList . 63 5.1.2 Top100NewsgroupList . 66 5.2 Limitations .............................. 67 5.3 Summary ............................... 68 6 Results..................................... 69 6.1 TREC2006SpamEvaluationKit . 70 6.2 SpamTestSim: Base Configuration . 73 6.3 SpamTestSim: Sending More Unsolicited Messages . 76 6.4 SpamTestSim: Replying More Often . 78 6.5 Summary ............................... 79 7 Conclusion................................... 81 7.1 FutureWork.............................. 83 7.2 Summary ............................... 86 References...................................... 87 A ExampleOfAgentConfigurationParameters. 94 A.1 Per-ClassParametersOnly. 97 A.2 Per-Instance Parameters Using A Regular Expression . 98 A.3 Per-Instance Parameters Using A Python Lambda Function . 99 A.4 InteractionOfPer-InstanceParameters . .100 A.5 Summary ...............................101 B UsenetNewsgroupListings. .102 B.1 CustomNewsgroupList . .. .. .102 B.2 Top100NewsgroupList . .. .. .103 vi List of Tables 5.1 DSPAM Classification Of Custom Newsgroup List . 64 5.2 ManualClassificationOfReplies. 66 5.3 Manual Classification Of Non-Replies . 66 5.4 DSPAM Classification Of Top 100 Newsgroup List . 67 6.1 Results of TREC 2006 Spam Evaluation Kit Against Spam Filters . 73 6.2 Results of Running SpamTestSim Against Spam Filters . 76 6.3 Results of Running SpamTestSim With More Unsolicited Messages . 77 6.4 Results of Running SpamTestSim With More Replies . 79 vii List of Figures 1.1 PublicInterfaceOfASpamFilter. 7 2.1 SpamFilterEvaluationFramework . 16 3.1 AgentClassDiagram............................. 30 3.2 Example Of Per-Class Parameters For HamAgent . 31 3.3 ExampleOfPer-InstanceParameters . 32 3.4 Example Of Input And Output For The Thunderbird 2.0 MailClient . 34 4.1 Social Network Generated By multiTzOrg . 48 4.2 SocialNetworkGeneratedByindepOrg. 50 4.3 Plots Of Degree Versus Frequency Of Nodes In Generated Social Networks 55 5.1 Simple Usenet Reply Message . 62 6.1 SpamTestSimBaseConfiguration . 75 6.2 SpamTestSim Configuration With More Unsolicited Messages . 76 6.3 SpamTestSim Configuration With More Replies . 79 A.1 ExampleSocialNetwork . 95 A.2 Example SpamTestSim Configuration . 96 viii List of Code Listings 3.1 SimulationPseudo-Code . 27 4.1 B-A Scale-Free Network Generation Algorithm . 44 4.2 multiTzOrg Social Network Generation Algorithm . 48 4.3 indepOrg Social Network Generation Algorithm . 51 4.4 Improved B-A Scale-Free Network Generation Algorithm . 57 ix 1 Chapter 1 Introduction Spam is a complex issue that affects everyone with an email account, whether they realize it or not. Cisco Systems Inc. estimates spam volumes to be between 85 and 90% of all email received in August and September 2008[7], or looking at raw numbers, in the order of 100 to 200 billion messages.1 While individually many users are annoyed by the extraneous messages appearing in their inbox on a regular basis, spam has greater effects on email and the Internet in general than just being an annoyance. With such a high percentage of spam messages being received by mail servers around the world, a large number of computing resources such as CPU time, memory, and disk space are wasted by any organization that operates a mail server. This is costly, to say the least, but even worse is the time wasted by system administrators and even individual users that must wade through the messages that their spam filter is unable to correctly classify. Spam is used as a vector for computer crimes, including the spread of computer viruses and worms, identity theft, and fraud. An early form of fraud widely seen in spam is advance fee fraud[55], carried over from the pre-Internet era, where victims are encouraged to pay the fraudster a small fee with the promise of receiving a large amount of money in the future. While this is the basic description, advance fee fraud has taken many different forms over the years[33]. Spam is also a common vehicle for phishing[56], where fraudsters trick victims into giving out personal information such as passwords for various online services, bank accounts, or Social Security numbers. These 1Statistics about spam are difficult to calculate globally, however companies like Cisco have sensors spread across the Internet, providing a reasonable estimate for the purposes of this discussion. 2 are only a couple types of particularly harmful spam, among the many more messages selling (sometimes illegal) goods, and many other schemes conducted using spam. The most widely used defense against spam is to deploy spam filters on mail servers and in email clients. An ideal spam filter would prevent all of that junk from reaching the user, while never losing an email that the user wants to see. Somewhere in the vast sea of noise are important email messages relating to business transactions, for which every email lost can cost hundreds or thousands of dollars. Unfortunately, no spam filter is perfect, and so the battle against those who send spam and those who protect the users and computers continues on, with economic losses estimated in the billions of dollars[16]. It is important to be able to evaluate spam filters and have a useful comparison of the accuracy and performance of the various spam filters available. Thorough evaluations help users decide which filter to use for their situation and help researchers focus their efforts as well as provide a benchmark for new ideas that are developed. This thesis discusses the importance of evaluating spam filters, the limitations of current tools, and introduces a new spam filter evaluation framework called SpamTest- Sim. SpamTestSim is designed to evaluate spam filter accuracy and performance by simulating certain human behaviours. SpamTestSim is a multi-agent system, where the agents simulate individual email users, spammers, and other automated email systems. The simulation focuses on emulating behaviours exhibited by humans with the goal of exposing weaknesses in spam filters that result in
Recommended publications
  • Planet of Judgment by Joe Haldeman
    Planet Of Judgment By Joe Haldeman Supportable Darryl always knuckles his snash if Thorvald is mateless or collocates fulgently. Collegial Michel exemplify: he nefariously.vamoses his container unblushingly and belligerently. Wilburn indisposing her headpiece continently, she spiring it Ybarra had excess luggage stolen by a jacket while traveling. News, recommendations, and reviews about romantic movies and TV shows. Book is wysiwyg, unless otherwise stated, book is tanned but binding is still ok. Kirk and deck crew gain a dangerous mind game. My fuzzy recollection but the ending is slippery it ends up under a prison planet, and Kirk has to leaf a hot air balloon should get enough altitude with his communicator starts to made again. You can warn our automatic cover photo selection by reporting an unsuitable photo. Jah, ei ole valmis. Star Trek galaxy a pace more nuanced and geographically divided. Search for books in. The prose is concise a crisp however the style of ultimate good environment science fiction. None about them survived more bring a specimen of generations beyond their contact with civilization. SFFWRTCHT: Would you classify this crawl space opera? Goldin got the axe for Enowil. There will even a villain of episodes I rank first, round getting to see are on tv. Houston Can never Read? New Space Opera if this were in few different format. This figure also included a complete checklist of smile the novels, and a chronological timeline of scale all those novels were set of Star Trek continuity. Overseas reprint edition cover image. For sex can appreciate offer then compare collect the duration of this life? Production stills accompanying each episode.
    [Show full text]
  • Manual Aberto De TIC E Libreoffice Capa: Miguel Vale 3ª Edição Editor: ISCTE – Instituto Universitário De Lisboa, Lisboa 2014 ISBN: 978-989-732-237-2 Suporte: E-Book
    Manual de Tecnologias de Informação e Comunicação e LibreOffice [ 3ª edição ] Comunidade LibreOffice Portugal Direitos de autor Este trabalho foi licenciado com uma Licença Creative Commons - Atribuição 3.0 Não Adaptada ou superior em conjunto com GNU General Public License v3+ ou superior. Todas as restantes marcas registadas presentes neste manual pertencem às respectivas entidades. Ficha Técnica Título: Manual Aberto de TIC e LibreOffice Capa: Miguel Vale 3ª Edição Editor: ISCTE – Instituto Universitário de Lisboa, Lisboa 2014 ISBN: 978-989-732-237-2 Suporte: e-book Autor(es) Os autores de cada capítulo estão descritos em cada uma das respectivas fichas técnicas. Feedback Envie os seus comentários ou sugestões sobre este documento para: http://wiki.documentfoundation.org/PT/Main_Page http://wiki.documentfoundation.org/PT/Documentation Acordo Ortográfico Cada capítulo deste documento foi redigido no acordo ortográfico definido pelo(s) seu(s) autor(es) na respectiva ficha técnica. Este capítulo foi redigido ao abrigo do Acordo Ortográfico de 1990. A toda a Comunidade LibreOffice Portugal. A todos os movimentos de Software Livre e Creative Commons em Portugal. A todos os Professores, Formadores e alunos e formandos que fizerem uso deste manual. A todos aqueles que apoiaram e acreditaram neste projecto. Caixa Mágica, Novell Portugal, Associação Ensino Livre, Associação Nacional de Software Livre, Associação de Apoio Social da Portugal Telecom, Ângulo Sólido, OpenLab-ESEV Laboratório de Software Livre da Escola Superior de Educação de Viseu, Instituto Superior de Ciências Educativas, Portal Forma-te e em especial ao ISCTE – Instituto Universitário de Lisboa. Aos nossos pais e família que agora poderão usufruir de mais tempo connosco.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Spybot - Search & Destroy Can Detect and Remove Spyware of Different Kinds from Your Computer
    Description Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not cover yet. If you see new toolbars in your Internet Explorer that you didn't intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don't see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies. Spybot-S&D; is free, so there's no harm in trying to see if something snooped into your computer, too :) Spybot-S&D; can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you worked on. And for professional users, it allows to fix some registry inconsistencies and offers some extended reporting features. License Spybot-S&D; comes under the Dedication Public License. Requirements Microsoft Windows 95, 98, ME, NT, 2000 or XP (32 and 64 bit), 2003, Vista. Compatible with bootable PE disks (e.g. BartPE) and Wine. Minimum of 10 MB free hard disk space, more recommended for updates and backups. Usage We recommend that you continue by reading the tutorial next. © 2000-2008 Safer Networking Ltd. All rights reserved. I. Freeware First of all, the reasons why Spybot-S&D; is free: I.a. Dedication Spybot-S&D; is dedicated to the most wonderful girl on earth :) I.b.
    [Show full text]
  • Unit 13 E-Mail and E-Messaging
    UNIT 13 E-MAIL AND E-MESSAGING Structure 13.0 Objectives 13.1 Introduction 13.2 E-mail 13.2.1 Defining Email 13.2.2 Need of Email 13.2.3 Email Address 13.3 Types of Email Services 13.3.1 Free Web-based Email Services 13.3.2 Priced Web-based Email Services 13.3.3 Private Email Services 13.4 Types of Email Account 13.4.1 POP/IMAP Account 13.4.2 Email Forwarder 13.4.3 Mailing List 13.4.4 Auto Responder 13.4.5 Email Bouncer 13.4.6 Email Blackhole 13.5 Structure and Features of Email 13.5.1 Header 13.5.2 Body 13.5.3 Features 13.6 Functioning of Email Systems 13.6.1 Protocols 13.6.2 Delivery Agent 13.6.3 Access Client 13.6.4 Setting up Account 13.6.5 Folder Management 13.7 Messaging 13.7.1 Instant Messaging 13.7.2 Unified Messaging 13.8 Issues with Messaging 13.8.1 Spamming 13.8.2 Privacy 13.8.3 Security 13.9 Widgets and Utilities 13.10 Summary 13.11 Answers to Self Check Exercises 13.12 Keywords 13.13 References and Further Reading 5 Internet Tools and Services 13.0 OBJECTIVES After reading this Unit, you will be able to: provide a detailed account about Email and Email service Providers; explain in detail various Protocols used in Email service; and discuss about Web 2.0 tools in Email. 13.1 INTRODUCTION Electronic Mail is one of the most prominent uses of networked communication technology.
    [Show full text]
  • Postfix (SMTP)
    Linux System Administration Postfix: a Simple Mail Transfer Protocol (SMTP) daemon ©2004 Ken Barber Some Rights Reserved This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. History of email ● Originally designed to send messages between users on the same (multiuser) system ● Simple program mail used to send & receive ● User's mail resides in /var/spool/mail – All messages in one single file; same name as user – Known as mbox format – Go look there now ● All of this is still with us today Email today: Three Agents ● Mail Transport Agent (MTA) – Transports mail from one system to another – Examples: Sendmail, Postfix, Qmail ● Mail Delivery Agent (MDA) – Often included in MTA ● Mail User Agent (MUA) – aka “email client”: pine, mutt, kmail, outlook etc. How it all works Sendmail: the original MTA/MDA ● Like Cthulhu: – An ancient daemon with tentacles coming out of its head – i.e., a Monster – Devours sysadmins & possibly small children too ● 80% of world's email transits Sendmail servers ● Don't use it unless you already know & love it ● Installed – and running – by default: 'nix needs an MTA to handle system messages The Sendmail replacement: Postfix ● 100% drop-in replacement for Sendmail – /usr/sbin/sendmail renamed to sendmail.sendmail – /usr/sbin/sendmail becomes a symlink to /etc/alternatives/mta – /etc/alternatives/mta
    [Show full text]
  • Le Web Social Table Des Matières
    Le Web Social Table des matières 1 Web social 1 1.1 Historique ............................................... 1 1.2 L'évolution du web social ....................................... 1 1.2.1 Blogs et wiki ......................................... 1 1.2.2 L'art social .......................................... 2 1.2.3 Le crowdsourcing ...................................... 2 1.2.4 Le développement d'applications mobiles .......................... 2 1.2.5 Des projets de logiciels communautaires ........................... 2 1.3 Du web social à la vie réelle ..................................... 2 1.4 Bibliographie ............................................. 3 1.5 Notes et références .......................................... 3 1.6 Voir aussi ............................................... 3 2 Réseautage social 4 2.1 Histoire ................................................ 4 2.2 Applications .............................................. 4 2.3 Modèle économique ......................................... 5 2.3.1 Commerce des données ................................... 5 2.3.2 Vente d'espaces publicitaires ................................. 5 2.3.3 Cession des actifs ....................................... 5 2.4 Domaines d'application ........................................ 5 2.4.1 Réseaux internes versus réseaux externes ........................... 6 2.4.2 Services en ligne de réseautage professionnels ........................ 6 2.4.3 Réseaux sociaux d'amis de la vie réelle ............................ 6 2.4.4 Services en ligne d'ancien
    [Show full text]
  • Bulletin Issue 28 Spring/Summer 2016
    Bulletin Issue 28 Spring/Summer 2016 These campaigns do not all agree Contents with each other. The slogan common between them is an attempt at mo- Youarewhatyourun 1 tivating us to more closely examine In it for the long haul: A what it is we are putting in our bod- model for long-term free ies. No food movement argues every- software campaigns 3 one needs to be, or should endeavor to become, a Michelin star chef. Every- Mr. Snowden: or how I one acknowledges that people choose learned to stop worrying to spend different amounts of time and and love GStreamer 5 energy learning about preparing and Governments pay to eating food. reinvent the wheel, or buy a proprietary wheel 6 User freedom in the age of computer-generated software 7 On the road with RMS 9 We need to fight for strong encryption. And stop DRM in Web standards. 10 But a certain very basic level of You are what you run food literacy is widespread. We take By John Sullivan many of the basics for granted. Even Executive Director if you do not have advanced culinary ou are what you eat is a popular skills, you know that hamburgers do Yslogan in many parts of the world not grow on trees (yet), that food in used by groups encouraging people general is prepared by taking ingredi- to change their eating practices. It ents from different places and combin- is used to promote vegetarianism, to ing them, often with heat, and that discourage “junk food,” to campaign if ingredients are not stored or han- against foods containing genetically dled in certain ways, some of them can modified ingredients, and more.
    [Show full text]
  • Origin of Email & Misuses of the Term “Email”
    Deborah J. Nightingale, Sen Song, Leslie P. Michelson, Robert Field Origin of Email & Misuses of the Term “Email” 2 Abstract: The origin of email, the system as we all know and use today, begins in 1978 when a 14-year-old Research Fellow, V.A. Shiva Ayyadurai, working at the University of Medicine and Dentistry of New Jersey (UMDNJ), located in New- ark, New Jersey, invented the first electronic system to replicate the interoffice, in- ter-organizational paper-based mail system consisting of Inbox, Outbox, Folders, Memo, Attachment, Address Book, etc. Ayyadurai named this system “email, ” a term he was the first to create, because he was inventing the “electronic” or “e” version of the interoffice, inter-organizational paper-based “mail” system. More- over, the specific naming of email arose for idiosyncratic reasons since FORTRAN IV, the programming language used to create his invention, required all variable and program names to be in upper case and a maximum of six charac- ters, while the Hewlett Packard RTE-IVB operating system, on which the software executed, had a five-character limit for program names. These constraints moti- vated the selection of “E,” “M,” “A,” “I,” and “L.” Prior to 1978, neither the term “email,” in any variation, upper case, lower case, mixed case, with or without the dash, nor did the software application “email” exist. After Ayyadurai’s invention, the term “email” was misused, primarily by members of the ARPANET communi- ty and Raytheon/BBN, to refer to their developments in rudimentary methods for exchanging text messages, done prior to 1978, as “email.” Such developments, while important in their own right, were not email, the system of interlocking parts intended to emulate the interoffice, inter-organizational paper-based mail system - -- the email we all experience today.
    [Show full text]
  • Network Externalities and Spillovers in the Email Client Software
    NETWORK EXTERNALITIES AND SPILLOVERS IN THE EMAIL CLIENT SOFTWARE Yingyot Chiaravutthi* Received: Apr 21, 2006; Revised: Sept 21, 2006; Accepted: Oct 27, 2006 Abstract This paper analyzes adoption decisions of email client software with the focus on network externalities, spillovers, and firms’ strategies. Survey data are used to test the existence of network externalities and spillovers by studying the claimed reasons for adoption. Based on the GVU WWW User Survey data in 1997 and 1998, logit models are employed to test hypotheses. The results show that Eudora’s competitive advantages were derived from its high quality product which was perceived by users, loyalty which was created from users’ prior experience, and network externalities and spillovers which were driven by high market share. Sources of network externalities and spillovers are outside accessibility and others’ recommendations, respectively. These advantages diminished when Netscape employed bundling with its suite, and when Microsoft employed bundling with its operating system and free strategies. Keywords: Email client, network externalities, spillovers, firm strategy, predatory pricing, bundling Introduction This paper analyzes adoption decisions for email 1960s, the U.S. Department of Defense created client software based on survey data. The the Advanced Research Projects Agency purposes of this paper are to test the existence Network (ARPANET) for the purpose of of network externalities and spillovers in the communicating between military and educational email client software, and to determine firms’ institutions until an engineer named Ray strategies and effectiveness of those strategies. Tomlinson found a way to send email messages between two nodes of the ARPANET network Email Client1 in the early 1970s.
    [Show full text]
  • The History of Email [1999-Now]
    THE HISTORY OF EMAIL 1999 NOW ® FreshAddress HELPING COMPANIES BUILD, UPDATE, SEGMENT & CLEAN MOBILE EMAIL THEIR EMAIL LISTS! BECOMES THE NEW BUZZWORD! 1999 400 MILLION MADE MOBILE EMAIL EMAIL ACCOUNTS MORE ACCESSIBLE WORLDWIDE 1999 AOL REACHES 34 MILLION MEMBERS CAN-SPAM ACT OF 2003 2002 THE FIRST NATIONAL STANDARDS FOR SENDING COMMERCIAL EMAIL! MAX 2003 STORAGE 1GB 625 MILLION EMAIL ACCOUNTS WORLDWIDE 2004 CHILD GMAIL LAUNCHES! PROTECTION UTAH & EMAIL ADDRESS MICHIGAN LAWS 750 MILLION PASS THE EMAIL ACCOUNTS 2005 WORLDWIDE OBAMA’S TEAM BROKE NEW GROUND, USING INTERNET PRESIDENTIAL CANDIDATE TO BUILD A NEW KIND OF COMPETES WITH GMAIL POLITICAL MACHINE! BARACK OBAMA COMPILES A DATABASE OF 2007 BY OFFERING 13 MILLION+ UNLIMITED EMAIL ADDRESSES STORAGE! 1 BILLION EMAIL ACCOUNTS 2008 WORLDWIDE 1.8 BILLION EMAIL ACCOUNTS CORPORATE VS. CONSUMER WORLDWIDE WORLDWIDE MAILBOXES EMAIL IS THE #1 MOST POPULAR ACTIVITY ON SMARTPHONES 2011 25% OF USERS CHECK EMAIL ON THEIR 3.1 BILLION 78% EMAIL ACCOUNTS 75% MOBILE PHONE WORLDWIDE 2013 21% OF CONSUMERS 3.6 BILLION 2013 CHECK THEIR EMAIL EMAIL ACCOUNTS WORLDWIDE BEFORE BREAKFAST SAG LIENT U E WOR IL C LDW A 16% ID EM E! 6% OTHER 2014 HOTMAIL 25% 6% APPLE IPHONE YAHOO! MAIL CANADA PASSES THE 2014 CANADIAN ANTI-SPAM 8% LEGISLATION (CASL) APPLE MAIL 14% GMAIL 12% APPLE IPAD 13% 4.4 BILLION MICROSOFT EMAIL ACCOUNTS OUTLOOK WORLDWIDE GES & ESSA 2015 L M AI EM HTML INTEGRATED IN INCREASED75 %BY WITH CSS 7 INTERACTIVE EMAILS BECAME A TREND EMOJI USE 2016 BUSINESSES LOST 2017 $676 MILLION 4.9 BILLION EMAIL ACCOUNTS TO SPAM EMAILS FROM DPR WORLDWIDE G FAKE VENDORS MAIL O GENERAL DATA E PE ST N PROTECTION E R H A G T I REGULATIONS (GDPR) 2018 E WAS PUT INTO EFFECT H OCCURS AT 2018 5.6 BILLION 11 A.M.
    [Show full text]
  • E-Mail Security for the 21St Century
    E-Mail Security for the 21 st Century E-mail has inherently been an unsecured method of communicating since its inception. While today e- mail is a frequently used and convenient method of exchanging information, such usage was not planned for in the technology's beginning. The basic principles of e-mail were established more than thirty years ago when the Internet, then called ARPANET, was an emerging technology. Trust was a basic principle of the Internet back then. Universities, military, and governmental facilities were the only users of the Internet and everyone knew everyone else. Back then there wasn't a need for authentication of who actually sent the message because only a limited number of people could gain access to the networks over which the messages were traveling. When networks began connecting to each other, e-mail security became more important. Users realized that they needed verification of who was sending the message to make sure no one has changed the message during transit, and, in some cases, they realized they needed to secure that information against prying eyes. By the mid 1990s, e-mail security became a needed addition to the messaging people already knew. Two protocols emerged as standards: Pretty Good Protection (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME). Both offered digital signaturesi which added the capabilities of authentication, non-repudiation, and data integrity. Message encryption added the capabilities of confidentiality and data integrity. For the user this helped ensure two things: First, that only the intended recipient can read the message. Second, that a person reading a message can be assure of the identity of the sender.
    [Show full text]