SPYWARE Presented by The State Security Office November 17, 2004.

Slides:



Advertisements
Similar presentations
Viruses & Spyware A Module of the CYC Course – Computer Security
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Mary Burger Owner ComputerDiva, LLC Vancouver, WA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Security Advice Georgie Pepper Campsmount Acadamy.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
What is Spam? d min.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Protect Your Computer Against Harmful Attacks!
Computer Security.
Presentation transcript:

SPYWARE Presented by The State Security Office November 17, 2004

We Have Viruses, Worms, Spam Virus – code inside existing program Worm – independent code that spreads Spam – message broadcast to many addresses

So What’s Spyware? Technology Gains information about user... without their knowledge Benefits other party, not user

Spyware Can... Track Browsing Steal Identity Corrupt Data Create Profiles Slow the Computer Slow the Network Change Homepage Modify Hosts File Download Malware Modify Registry Change Settings Hijack Computer Leak Information Violate HIPPA

Good Cookie Not all Information Gathering is Bad! Retains sign-on through session Holds a shopping cart Allows purchases Gets correct delivery address Holds the user’s place

Bad Cookie Some Information Gathering is Very Bad Gets more than you intend to give Holds it longer than you want Shares it with others

Kinds of Spyware Adware –  Annoyance or  Serious problem System Monitors –  Monitors activity  Reports to others Trojan Horses  Innocent looking program  Causes harm

$pyware Why do we have Spyware infections? $$$$ MONEY $$$$$ “I’m your bank, give me your account number...” “Okay, it’s anything else you want?”

$$ Motivation $$ Target advertising Aggressive advertising Advertisers pay to piggyback Sell bogus products Credit cards, passwords, account numbers Get private business information Extortion

How? People Open Doors... F for User Awareness... Fall for ploys (phishing) Fail to keep software updated Fail to keep security settings reasonable Fail to use spyware protection

Doors Users Open #1 is P2P File Sharing Software vulnerabilities Weak privacy settings Intentional downloads Bad Internet neighborhoods End User License Agreements Clicking on pop-up advertisements Phishing

Sneaky Ways In Cookies Unintentional downloads Drive-by downloads Piggybacking on legitimate downloads Disguised anti-spyware Disguised anti-porn Associated with trusted products

Prevention People Tools Policy

People Awareness Reactions to social engineering ploys  Don’t click on links in pop-ups  Don’t believe spam reports Extreme caution when loading software Know how to recognize problems Know how to use the tools Understand the policies

Tools Choose good software tools  Keep the products updated  Use them regularly Know about good resources Take advantage of the P3P standard

Policy Product updates Restrict or forbid dangerous practices  P2P file sharing  Public instant messaging  Unapproved software installation Use appropriate settings Consider notebook and home systems Report problems promptly

Legislation State and Federal Much is already illegal Legislation may not help much

Detection Use good tools Inoculate Update weekly Scan weekly Symptoms: Slow computer, lots of pop-ups, browser hijacking

Removal Remove bad files Remove copies of files! Reverse host file changes Reverse browser changes Reverse registry settings Good tools and/or Experienced Help

Resources The State Security Office  Spyware Warrior  Spybot Search and Destroy  Ad-Aware 

Ad-Aware Can I use Ad-Aware Personal (free) version at work? No, Ad-Aware Personal is free for individual use only. For profit business entities, governmental entities, or educational institutions, must purchase a valid end-user license in order to use the software. Lavasoft FAQ, November 16, 2004http://

Spyware Warriors Real Spyware... Real Spyware Warriors... Their Stories Tim Stoddard, UALR Sky Brower, PC Assistance