Is your computer being used against you while you sleep?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
What is Spyware? Where did it come from?.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Chapter 4 Personal Security
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Cyber Crimes.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Safety and Security issues of using ICT Alys brooks.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Computer Security Keeping you and your computer safe in the digital world.
For more information on Rouge, visit:
Technical Implementation: Security Risks
Managing Windows Security
What they are and how to protect against them
Chapter 6 Application Hardening
Cyber Security & awareness
Common Methods Used to Commit Computer Crimes
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Homeland Security: Computer Protection
Challenges We Face On the Internet
What is a Firewall Anyway?
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Applications Unit B
Risk of the Internet At Home
Chap 10 Malicious Software.
Spyware. By: Katheryn L. Gaston.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Chap 10 Malicious Software.
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
What is keystroke logging?
Presentation transcript:

Is your computer being used against you while you sleep? Spyware Is your computer being used against you while you sleep? By Paul Box CS526

Outline Why do we care? What is Spyware? What do we do about it? The Spyware test. 12/26/2018 Paul Box / CS526

Why do we care? Spyware is becoming very prevalent Spyware is a way to make cheap and easy money Spyware users want to make this money from you If you are not cautious, they may be making money from you now Some of the ways to make money can really harm you. 12/26/2018 Paul Box / CS526

So what is spyware? There are many types of spyware: Adware Dialers Joke Programs Hack Tools Remote Access programs Spyware 12/26/2018 Paul Box / CS526

Adware “Programs that facilitate delivery of advertising content to the user through their own window, or by utilizing another program's interface. In some cases, these programs may gather information from the user's computer, including information related to Internet browser usage or other computing habits, and relay this information back to a remote computer or other location in cyber-space.” 12/26/2018 Paul Box / CS526

Adware These are pop up programs or gather information about computer usage Used by people trying to make money from directed spam and advertisement money Example is: Adware.WinFavorites Checks your favorites and send pop ups that relate to it 12/26/2018 Paul Box / CS526

Dialer “Programs that use a computer or modem to dial out to a toll number or internet site, typically to accrue charges. Dialers can be installed with or without a user’s explicit knowledge, and may perform their dialing activity without a user’s specific consent prior to dialing.” 12/26/2018 Paul Box / CS526

Dialer Typical program that takes over a Modem and dials to locations without a user’s consent Usually meant to increase the user’s phone bill Less used as High Speed connections replace dial up Example: XXXDial Dials international location to deliver porn to a person’s computer 12/26/2018 Paul Box / CS526

Joke Programs “Programs that alter or interrupt the normal behavior of your computer, creating a general distraction or nuisance. Joke programs generally do not themselves engage in the practice of gathering or distributing information from the user's computer.” 12/26/2018 Paul Box / CS526

Joke Programs Usually meant as a joke Usually not malicious or harmful Made by people that just wants to show how they can get in a system if they wanted to Example: Joke.Win32.DesktopPuzzle Turns your desktop into a slider puzzle 12/26/2018 Paul Box / CS526

Hack Tools “Tools that can be used by a hacker or unauthorized user to attack, gain unwelcome access to or perform identification or fingerprinting of your computer.” 12/26/2018 Paul Box / CS526

Hack Tools 2 Types Very Malicious Keystroke Loggers Distributed denial of service attacks Very Malicious Used to gleam personal information, bank accounts or passwords Also can help to take over a computer to be used to attack another computer 12/26/2018 Paul Box / CS526

Hack Tools Those that use them are trying to do identity theft or use a computers resources to attack other networks (this is a service many hackers pay for) Example: Haxdoor.o Opens port 1661 on the computer and allows full access to others later can use it Example: KeySpy Keystroke logger that records all keystrokes and emails it to an email 12/26/2018 Paul Box / CS526

Remote Access programs “Programs that allow one computer to access another computer (or facilitate such access) without explicit authorization when an access attempt is made. Once access is gained, usually over the Internet or by direct dial access, the remote access program can attack or alter the other computer. It may also have the ability to gather personal information, or infect or delete files. They may also create the risk that third party programs can exploit its presence to obtain access.” 12/26/2018 Paul Box / CS526

Remote Access programs Back Door programs Makes it easier for access to be gained at future times when it is needed Can be used to have other programs like hack tools installed Example: MindControl Opens port 23 to allow full control over a computer 12/26/2018 Paul Box / CS526

Spyware “Programs that have the ability to scan systems or monitor activity and relay information to other computers or locations in cyber-space. Among the information that may be actively or passively gathered and disseminated by Spyware: passwords, log-in details, account numbers, personal information, individual files or other personal documents. Spyware may also gather and distribute information related to the user's computer, applications running on the computer, Internet browser usage or other computing habits.” 12/26/2018 Paul Box / CS526

Spyware Used to assist in identity theft Usually a keystroke logger that transmits its information whenever a secure webpage is accessed Example: Realtime-Spy Keystroke logger that records personal passwords and transmits to a remote account 12/26/2018 Paul Box / CS526

The Bad Guys Spyware, Remote Access programs and Hack tools Usage: Programs to log keystrokes or screen shots and then send that information to some type of account that will be used to gleam important account and password information. Programs that will be used to allow easier access to the infected computer at a later date. Programs used to take over an infected computer and use its resources for their own purposes 12/26/2018 Paul Box / CS526

What to do? Spyware removal software Edit the registry Find and remove the program Reformat the hard drive Restore Back ups Prevention Never go online (ever) Firewalls Spyware detection programs 12/26/2018 Paul Box / CS526

The Spyware Test Spyware Warrior Decided to test what spyware removal and prevention tools were the best Ran 3 test runs to see what was the best Infected a computer with spyware in a controlled environment Ran spyware search and destroyers to see which was the best Results are found here. 12/26/2018 Paul Box / CS526

The Spyware Test Results: Determined that none were really any good (none can detect and remove everything) The best were: Adware Microsoft Anti-spyware Beta Pest patrol Spybot Search and Destroy Webroot Spyware Sweeper 12/26/2018 Paul Box / CS526

The Spyware Test Conclusions: Spyware and adware can prove quite difficult to remove, even for dedicated anti-spyware scanners even to disabling the spyware so it can not run on reboot or detecting them. No single anti-spyware scanner removes everything. Even the best-performing anti-spyware scanner in these tests missed fully one quarter of the "critical" files and Registry entries. This means that the programs were at best 75% effective. It is better to use two or more anti-spyware scanners in combination, as one will often detect and remove things that others do not. Prevention is always preferable to scanning and removal. Moreover, users should learn to practice safe computing habits, which include avoiding web sites and programs of unknown or dubious provenance and carefully reading End User License Agreements and Privacy Policies. 12/26/2018 Paul Box / CS526

References Spyware Test Spyware Definitions Spyware Listings 12/26/2018 Paul Box / CS526

Questions??? 12/26/2018 Paul Box / CS526