Spyware and Adware Rick Carback 9/18/2005

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
What is a Firewall Anyway?
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
What is it and how to make your computer go fast again.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet safety By Lydia Snowden.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
What is Malware? Definition: Definition: A generic term used to describe any form of malicious software; e.g., Virus, Trojan horse, Spyware, Adware, Malicious.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Internet Advertising David HinojosaKelly Hodges. Internet Advertising Online advertising is a form of promotion that uses the internet to deliver marketing.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Spyware Also known as Adware. Introduction Identify Spyware, and the common problems they cause Provide customer with the information they need to correct.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
MALWARE Autumn Mattis.
Instructor Materials Chapter 7 Network Security
Spyware. By: Katheryn L. Gaston.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Spyware and Adware Rick Carback 9/18/2005

What is Adware? Advertising supported software Goes beyond the advertising found in shareware or freeware May run without user knowledge Shows unwanted advertisements Required by terms of use

What is Spyware? May be bundled or included with other software or install itself through other means Sends information about host computer back to a remote system or user Runs without user knowledge

Adware vs. Spyware Adware typically only annoys the user while Spyware will annoy and collect information to be sent back to the creator. Generally speaking Spyware is seen as more invasive and subversive Adware. Not all Adware and Spyware can be considered bad.

Spyware and Adware that isn’t bad? What? Some desirable applications, like kazaa, require the bundled adware to be running in order to work Monitoring child internet access Some people like targeted advertising

Why Adware and Spyware? Keeping installed software up to date Preventing software piracy Preventing illegal or unacceptable use of installed software Gathering of Marketing Information Annoying Advertisement Complete Privacy Invasion Illegal or Unacceptable use of resources Password, , and username harvesting

How does it get there? Installation required by Terms of use for other software –Embedded –Bundled Exploitation of browser or operating system vulnerability Pure deception

What does Spyware do? Usually hides from user once installed Uses central server or acts as a central server to send the information gathered May install other software or remove competitors software Targeted popup ads from observed website visits

More Spyware Operations Removes advertisements and replaces them with its own Alters search engine results Sends user to advertisers page instead of that requested

Spyware Operations (cont.) May direct machine to participate in a coordinated DOS or other attack Any information entered may be tracked –Extortion –Identity Theft

Effects of Spyware Complete Security breach Abuse of computer resources –Computer becomes unreliable (slows down or crashes) –Computational power may be sold by spyware author –Download, store, and serve illegal or unwanted content

Examples of Adware/Spyware

Security Implications of Adware/Spyware Insecurities in Adware/Spyware applications mean the user is at risk Spyware can give an attacker complete control

Symptoms of Infected machines Unusually long browser startup times Reset homepage on browser Computer and Internet response is sluggish Unexplained popup messages Ads of competitors on the visited website System instability

Removing Spyware Clicking remove almost never works Customized tools for specific spyware applications More general Anti-spyware Tools are available that work much like Anti-virus software.

Avoiding Adware and Spyware Purchasing Adware free version Using free software Use Anti-Virus, Anti-Spyware, and Firewall applications

Stopping Spyware Internet Service Provider monitoring and blocking tools (WebTap) Better Operating System Design –Mac OS X and Linux are mostly adware free –SE Linux could prevent it altogether (processes do NOT have the same privileges as the user running them) Rise of the Internet generation

References Adware and Spyware: A growing privacy and security problem, David Saurino, SANS GSEC 2004.