1 The Information School of the University of Washington Nov 17fit100-21-spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.

Slides:



Advertisements
Similar presentations
Viruses & Spyware A Module of the CYC Course – Computer Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spyware & Internet Security
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
Business Technology Applications What is Malware.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
An Introduction to Phishing and Viruses
IT Security  .
Protect Your Computer Against Harmful Attacks!
Spyware & Internet Security
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
The Dark Side of the Internet
Presentation transcript:

1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE 100, Fall 2006 Fluency in Information Technology

2 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Readings and References Reading »Fluency with Information Technology Chapter 17 References »See web page

3 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Negative Issues Malware »Viruses, et al. »Spyware / Adware Privacy »Phishing Malicious »Cracking (not hacking) »Network service attacks

4 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Different Types of Virii/Spyware Spyware Adware Embedded Programs Trojan Horse Browser Hijackers Dialers Worms

5 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Why do people make Virii/Spyware? Profit Malice Boredom Business A challenge “Respect” from other virii writers

6 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington How do I know if I’ve got a Virus/Spyware? Virii »Programs will stop working correctly »Loosing data (documents disappearing) »Computer is running slower than normal Spyware »Popups (on or off the internet) »New toolbars »Home page changes »Search results look different »Error messages when accessing the web

7 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

8 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

9 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

10 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

11 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

12 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

13 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

14 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

15 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

16 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington What does Spyware look like?

17 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington How do I get rid of Spyware? Use a legitimate spyware removal program »Windows Defender: ware/software/ ware/software/ »Spybot:

18 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington How do I prevent Spyware? Be conscious of what you are clicking on/downloading Some pop-ups have what appears to be a close button, but will actually try to install spyware when you click on it. Always look for the topmost right red X. Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time.

19 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington How do I get rid of/prevent Virri? Run antivirus software » Keep it up to date! »Virus definitions need to be updated regularly!

20 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Phishing Most commonly an stating your account information needs updating Watch for URL’s that are numeric or different from the link you clicked on Best thing to do is to type in the URL and check your account directly without following any links in the Many legitimate s no longer contain a link (Paypal)

21 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Phishing Examples

22 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Phishing Examples

23 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Phishing Examples

24 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Phishing Examples

25 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Phishing Examples

26 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Phishing Examples

27 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington How secure do you need to be? Be Prudent not Paranoid Did you initiate the action? Why is this free? Is the source trustworthy? When in doubt search for it!

28 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Hackers White Hat »Very tech savvy and use powers for good »Security consulting, penetration testing, security audits, etc… »Goal is to help Grey Hat »Very tech savvy and use powers for good - sort of »Goal is often to help, but by doing mischievous things in the process Black Hat »Very tech savvy »The bad guy! »Goal is to “own you”

29 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Cracking (Bad Hacking) Black Hats doing bad things »Defacing web sites »Stealing private information »Stealing money »Blackmail »Etc…

30 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Cracking - What are their secrets? Social Engineering »Manipulating people to have them give you access »“Hello I am calling from tech support about the problem you submitted. Let me get your password and I will help you right away…” Buffer Overflow »Finding problems in programming code »Writing outside of memory location (Example - writing past the end of an array into a variable called: myPassword and saving your own password) Cross Site Scripting »One site or program is used to edit another site »See my example: (works in IE and Safari)

31 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Denial of Service Attack Also known as a DoS attack »attack on a computer system or network that causes a loss of service to users Consuming the bandwidth of the victim network or overloading the computational resources of the victim system. Sort of like someone constantly calling you over and over again. You wouldn’t be able to use your phone. If they don't affect you directly »May slow down your network service... If they do affect you directly »May block your network service...

32 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Questions If I wanted to update a group of co-workers about a project and solicit their feedback, would I want to use a synchronous or asynchronous system? What communication system would work well and why?

33 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington Questions If I were in marketing, and wanted to “put my finger on the pulse” of a particular group of people: say candy lovers, what social technologies could I use to find out what they are thinking?