Professional Documents
Culture Documents
PROLOGUE ........................................ 6
CHAPTER ONE - THE BARE BASICS .... 7
WHAT IS SPAM? .......................................... 7
WHAT IS SPYWARE? ..................................... 8
CHAPTER TWO - ESTABLISHING A
CONNECTION .................................. 10
DETERMINE THE NEED .................................. 10
PUTTING YOUR EMPLOYEES IN THE KNOW ........... 12
EXECUTION ............................................... 13
FREQUENT SAFEGUARDS ............................... 14
EVALUATION.............................................. 16
CHAPTER THREE - MAPPING ........... 18
MORE ABOUT CHOICE ................................... 18
ActiveX and Java ...........................................19
Browsers and Registry.................................... 19
Cookies ........................................................19
Beginners and Students.................................. 20
A Few Key Employees ....................................20
Get your employees to commit ........................ 20
SETTING THE STAGE .................................... 21
CHAPTER FOUR – BE IN THE KNOW 23
KNOW THE ENEMIES .................................... 23
KNOW YOUR FRIENDS .................................. 24
2|Page
FINE TUNING............................................. 26
COMPARING AND PRICING OF SPAM BLOCKING
SOFTWARE ............................................... 28
Research ......................................................28
Price ............................................................28
Support and Upgrades.................................... 29
Training .......................................................29
References ...................................................29
COMPARING AND PRICING OF SPYWARE BLOCKING
SOFTWARE ............................................... 30
Research ......................................................30
Price ............................................................30
Support and Upgrades.................................... 31
Training .......................................................31
References ...................................................31
CHAPTER FIVE - RELATING TO
OTHERS .......................................... 33
FORGETTING THE SAFEGUARDS ........................ 33
CHECK POINTS .......................................... 33
GET RID OF THE SLUDGE CHECKLIST ................. 35
CHAPTER SIX - MORE GUARDS AND
OPTIONS FOR SPAM ....................... 36
ASP OR APPLICATION SERVICE PROVIDER ........... 36
Spam and Blocking Programs ..........................37
External Hardware .........................................38
Preset Spam Blocking Program ........................ 39
CHAPTER SEVEN – MORE GUARDS AND OPTIONS FOR
SPYWARE ................................................. 40
3|Page
ASP OR APPLICATION SERVICE PROVIDER ........... 40
SPYWARE BLOCKING PROGRAMS ...................... 41
EXTERNAL HARDWARE .................................. 42
SPYWARE BLOCKING PROGRAMS ...................... 43
CHAPTER EIGHT – SOLVING
DIFFERENCES ................................. 45
SPECIFIC EMPLOYEE TRAINING & HARMONY ......... 45
GROUP AND INDIVIDUAL TRAINING ................... 46
Preparation: .................................................46
Delivery: ...................................................... 46
Practice:.......................................................47
General Points to Ponder: ...............................47
Handbooks: .................................................. 48
AFTER TRAINING - GETTING READY TO DRIVE ...... 49
PEOPLE HELPING PEOPLE ............................... 51
CHAPTER NINE - MAPPING SAMPLES
....................................................... 54
TEST THE SPAM .......................................... 54
ORGANIZE THE TEST DATA ............................. 55
MAKING USE OF THE EVALUATION .................... 56
SPAM TESTING FOR REAL .............................. 57
SPIES AMONG US........................................ 59
ORGANIZE THE TEST DATA ............................. 60
MAKING USE OF THE EVALUATION .................... 61
SPY HUNT ................................................ 63
CHAPTER TEN – TECHNICAL REALM 65
4|Page
DAY TO DAY STUFF...................................... 65
CONCLUSION .................................. 68
REVIEW OF SYSTEMS ................................... 68
5|Page
Prologue
6|Page
Chapter One - The Bare Basics
A good starting place would be basic information about
Spam and Spyware. Understanding a problem goes a long
way in finding a solution. The company owner must select
the program, install the program, and then train the
employees in the proper use of the program. You could
have the best programs in the world but without proper
installation and use, the program would be useless. This
would be like filling up the swimming pool and not plugging
the drain. You get absolutely nowhere.
What is Spam?
What is Spyware?
8|Page
Legal protection is available. Internet Service Providers
are eager to catch and prosecute the offenders. Local,
State, and Federal agencies have special task forces to do
their own tracking for these felons.
9|Page
Chapter Two - Establishing a
Connection
10 | P a g e
have the biggest impact in the selection of a blocking
program. Terminals in one location and linked usually
require one program with a fee for multiple users. Terminals
in different locations but are linked usually require more
than one program with a fee for multiple users. Multiple
stand alone systems usually require a program for each
terminal.
11 | P a g e
technical support will be required. Getting the support of
the employees will be necessary. Unwilling staff will make
utilization of the program difficult and not run smoothly.
Things to consider:
Execution
13 | P a g e
to the proper specifications for your needs. After this,
regular scans for Spyware, Spam, and tracking cookies
should run. Any offenders will be placed either in a spam
folder, in quarantine, healed, or deleted. This will depend on
the settings you specified during installation. Emails placed
in the spam folder can be viewed to ensure an acceptable
email was not sent to this folder. In the early stages of the
program, this would be advisable.
Frequent Safeguards
14 | P a g e
company, regular updating of the program will be
required. Just as the user has to adjust the settings
regularly, the software program has to be kept current.
New schemes and threats are developed each and
every day. As these become apparent, the parent to
the blocking software works to add to the program
specific to these threats. Also, changes in the internet
programs, operating systems or email service will
require bringing the software current. Think of updates
as reinforcements for the working army.
15 | P a g e
updates are required. Remember, nothing is going to
work for your company if it’s not used. Programs
without updates will soon begin to look like a piece of
Swiss cheese that is full of holes.
Evaluation
17 | P a g e
Chapter Three - Mapping
Remember the definition of spyware? Spyware is a
method to get information about your company without your
permission and without your knowledge. It will follow the
paths of the user and send it to the originator of this
predator. Spyware also records the user’s key strokes in
order to configure passwords, account information, and
company’s vital information. Because Spyware can obtain
such valuable information and sensitive information, this
chapter will map out specifics to choosing a Spyware
Blocking program.
18 | P a g e
ActiveX and Java
Cookies
20 | P a g e
valuable information. Both take this information and use it
in ways that can cause serious, unrecoverable assets and
operations. Therefore, it’s important to ensure that your
employees are aware of all the proper procedures and
policies so that everything will run smoothly; otherwise, if
your employees do not commit themselves to this – it could
drastically fail.
21 | P a g e
So, let’s do this:
22 | P a g e
Chapter Four – Be in the Know
Know the Enemies
But, why all the effort to get the spam to you? Simple -
Money. If a hundred emails are sent and they get one
response, they get money. They make money from the sale
of addresses. Spamming is big business. Illegal, but big.
9 Run the scans. Don’t just rely on the preset days and
times to scan.
25 | P a g e
9 Don’t let these changes be predictable, if at all
possible. Re-work the password at odd and various
times. Never set a specific day and time to reset
passwords.
Fine Tuning
26 | P a g e
The email begins with the internet server’s email
system, passes through the spam filter.
27 | P a g e
follow these guidelines. The company wants the email sent
to their clients, not a spam folder, and they want it to not be
available to spammers.
Research
Price
Training
References
29 | P a g e
Do they list the company’s main personnel? How many
employees are available? The company needs to be assured
the software company is large enough to handle your
business.
Research
Price
Training
References
31 | P a g e
with a large client base.
32 | P a g e
Chapter Five - Relating To Others
This section details management and delegation of
duties.
Check Points
34 | P a g e
network terminal to another. Seek support for these
leaks. Make sure each computer network terminal is
loaded properly and updates are complete and up to
date.
35 | P a g e
Chapter Six - More Guards and
Options for Spam
It’s time to deal with the different types of spam and
programs. This means how they will be delivered and
utilized as filtering software. General users on personal
computers would most probably download a free or
inexpensive software blocking system. A company can’t
afford to pick just any old software and download the
program. There are other methods of spam and blocking
programs to install or use.
36 | P a g e
9 Reduction of liability if Company’s format is captured
and forwarded to others. This is unlikely since the
Company directory will not be directly available.
37 | P a g e
9 Manages updates, policy, and support in house.
External Hardware
38 | P a g e
9 Company is responsible for managing updates, patches,
and support needs.
9 Usually downloaded.
39 | P a g e
Chapter Seven – More Guards and Options
for Spyware
41 | P a g e
9 Email can’t be read by a third party administrator.
Manage frequent changes such as white list, blacklist,
or keywords in house.
External Hardware
Next on the list of spyware and managers is the External
Hardware. Closely resembles the ASP in the aspect that the
email goes through the external hardware then to the main
system. One big difference, the Company owns the
hardware, the software, and stays in house. Another one
that would most probably be paired with the Spam
protection.
Let’s take a more detailed look into the world of the external
hardware in the aspect of spyware protection:
42 | P a g e
operating system. This means less tragedy and
breakdown. Less potential to directory attack. Total
loss if Tornado strikes particular area.
9 Usually downloaded.
43 | P a g e
Spam protection helps with many helpful and necessary
matters like time, and the bottom line. Spyware protection
does the same, but in the same way provides even more
valuable protection. Choosing the manner in which the
protection is supplied results in another choice.
44 | P a g e
Chapter Eight – Solving Differences
45 | P a g e
Group and Individual Training
Preparation:
Delivery:
46 | P a g e
o Discuss the subject. (Teach the class)
9 Don’t ramble.
Practice:
47 | P a g e
understanding.
9 Be professional.
9 Show Confidence.
9 Be calm.
9 Be direct.
9 Start on Time.
9 End on Time.
Handbooks:
More often than not, people will need the visual clues
48 | P a g e
and the handbook. Handbooks are most helpful to most
users as a reference guide after learning. It’s something
they can go back to should a question arise at a later time
after the initial training.
49 | P a g e
happen with this method. A disaster a company absolutely
cannot afford to let happen. Careful planning of the
program installation is as important as the program itself.
50 | P a g e
Troubleshooting, staggered schedule, support or
training personnel and the legal eagles will help make this
transition smoother. There can’t be enough planning or
assistance when first starting the use of anti-spam or anti-
spyware software. Make less trouble for your employees
and in return, you will receive less trouble. Preparation is
essential here.
o Administrators
o Bank
51 | P a g e
o Board of Directors
o Legal Counsel
52 | P a g e
revised for appropriateness as well.
53 | P a g e
Chapter Nine - Mapping Samples
The Spam software is installed; the employees have been
trained; now, it’s time for the real test.
54 | P a g e
Organize the Test Data
9 Length of Scan
9 Glitches in scanning:
o Includes program issues
o Computer system issues
o Employee operation issues
56 | P a g e
9 Is the program allowing too much Spam to go out?
o Examine the keywords and program specifications.
o Restructure the rules and specifications for
outgoing email.
58 | P a g e
downloaded.
Spies among Us
59 | P a g e
is found will determine the action the software program will
take.
9 Glitches in scanning:
o Includes program issues
o Computer system issues
o Employee operation issues
60 | P a g e
9 Calls to In House Support:
o Includes nature of issues
o Response to the issues
o Final outcome
61 | P a g e
9 Examine web sites visited.
o Determine whether Spyware threats are found
more often after certain sites are visited.
62 | P a g e
Spy Hunt
63 | P a g e
9 Take samples a regular uploads and sites usually sent
and visited. This also should be used with a
comparable volume per terminal.
64 | P a g e
Chapter Ten – Technical Realm
Day to Day Stuff
Everyday details are necessary. In this case, daily
maintenance may not be necessary, but regular
maintenance is most definitely a necessity. Start with the
top.
9 Reset keywords.
9 Scan directories.
Vaults or Quarantine:
65 | P a g e
9 Check for reasons vault is not getting full
66 | P a g e
company client base is one of the major reasons for
installing the program.
67 | P a g e
Conclusion
Review of Systems
69 | P a g e
company’s needs.
70 | P a g e