Spyware: Stealthy and Deadly

Slides:



Advertisements
Similar presentations
Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising.
Advertisements

AVG Anti-Spyware 7.5 (formerly ewido) David Cox Instructional Technology Facilitator Region 6 TLTC.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
What is Spyware? Where did it come from?.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
SPYWARE  Do you know where your personal information is?
What is it and how to make your computer go fast again.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
SPYWARE Computer Applications L6D, LAM Siu Fai (18)
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Cyber Security… Compiled by J. Camp Benfer Elementary Klein ISD March 2009 …or How to Keep Your Computer & Your Personal Information Safer …or How to Keep.
Adware and Spyware By Mr. Arbogast.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
THIS powerPOINT Is ABOUT virus’s AND OTHER Harmful RISKS.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Spyware Who’s spying on you?. What is Spyware? Spyware is software or hardware installed on a computer without the user's knowledge which gathers information.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Best Free Key logger Download Computer & Internet Monitoring Software.
Unit 4 IT Security.
Various Types of Malware
Internet and security.
Cyber Security By: Pratik Gandhi.
Information Security 101 Richard Davis, Rob Laltrello.
What is a Firewall Anyway?
Spyware & Internet Security
Computer Technology Notes 5
Spyware. By: Katheryn L. Gaston.
Spyware: Technical Overview
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Spyware: Stealthy and Deadly By Aylmer Or

Spyware: Stealthy and Deadly Origin What is Spyware? Types of Spyware How does it work? Solution / Prevention Questions

Origin Surfaced on the internet through many “free programs” - “No such thing as a free lunch” - P2P file-sharing programs like Kazaa – Programs are implemented with tracking software, hence the name. Infected Websites Pop Up ads

What is Spyware? Spyware is Internet jargon for Advertising Supported software (Adware). Little nasty programs that invade your computer without you knowing. They allow the transfer of personal info over the internet, modify or destroy personal files or attempt to take over the computer system.

Types of Spyware Tracking cookies Browser Hijackers - Examples :Kazaa, Gator, Morpheous, Emule....etc Browser Hijackers - Examples: pop up ads when not on internet, home page is changed, new shortcuts/toolbars.etc Monitoring Software / Hardware - Examples: Keyloggers, Chat loggers, Pw Recorders.etc

How does it Work? Tracking Cookies Browser Hijackers Works by installing programs on your system to store your personal information using cookies) Tracks your personal info, hence the name. Credit card numbers, passwords, usernames...etc goes to companies or individuals. Browser Hijackers uses similar tracking component technology to lurk into your computer without you knowing Monitoring Software / Hardware uses software or hardware place on your computer to track the letters you type or take snapshots of it.

Solution / Prevention Do not attempt to REMOVE SPYWARE yourself. Many items are connected to system files or programs or all over the place. Use Spyware Removal Software Example : Ad-Aware, Spybot S&D Prevention: Anti Spyware Software Change Internet Browser: Use Mozilla (http://www.mozilla.org) or Avant Browser (http://www.avantbrowser.com) Increase IE Security Be Smart and use Common Sense (Don’t Install GATOR!!!)

Questions?