ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
SPYWARE  Do you know where your personal information is?
August 15 click! 1 Basics Kitsap Regional Library.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Security Advice Georgie Pepper Campsmount Acadamy.
How It Applies In A Virtual World
Chapter Nine Maintaining a Computer Part III: Malware.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Learning In A Techno World How Safe is Your Cyberspace?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
IT security By Tilly Gerlack.
SPYWARE Computer Applications L6D, LAM Siu Fai (18)
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
How Spyware works?. Introduction Spyware is an umbrella name for many types of malicious codes Spy on ones behavior May watch web pages one visit and.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Keeping Your Computer Safe and Running Efficiently.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Spyware. By: Katheryn L. Gaston.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing

Spyware  Umbrella term for software that “watches” your surfing activity  Without your knowledge, reports on  Web pages you visit  Track your Web searches  Record keystrokes  Open a backdoor into your computer

Spyware  How does it get on your computer?  By downloading and installing “free” software  Kazaa file-sharing software, for example  Spyware “rides along”  Installing what you wanted causes the spyware to be installed as well  Spyware runs whether or not the installed application is running

Spyware  Purpose – generate cash  Delivers pop-up ads  Clicking to close still generates cash for the ad developer  May even cause a new ad to pop up

Spyware  At regular intervals the spyware sends information back to its owner  Information collected and analyzed  Profile about you built  Ads targeted to you specifically are then sent to you when you run the program the spyware came in on

Spyware  Deleting the original application usually has no effect on the spyware  Might not be able to deliver ads any more but it still reports on your activities

Spyware Money Trail  Reputable Web sites or merchants may be part of a money trail associated with spyware  User signs up as an affiliate  Your Web site has a link to someone else’s site  They agree to pay you for referrals  Examples: Dell, Staples, Clickbank DellStaplesClickbankDellStaplesClickbank

Affiliates

Spyware Money Trail  Affiliate signs up and receives an ID  Some merchants monitor affiliates, some don’t  Spyware commonly follows merchants who do not do a good job of policing their affiliate programs

Spyware Money Trail  Spyware authors make deals with affiliates  Their spyware includes links to the affiliate’s real destination and uses their ID  Affiliate includes spyware on their Web site or otherwise distributes it  Unsuspecting user downloads spyware  Clicks on links

Spyware Money Trail  Merchant counts clocks and pays affiliate  Affiliate splits income with spyware author  Pop-under – variation of a pop-up  Opens a new window hidden under the active window

Spyware Money Trail  A pop under promoting Gateway, purchased from Direct Revenue by a rogue affiliate.  If a user ultimately makes a purchase from Gateway, the pop under causes Gateway to pay commissions to the affiliate, via Commission Junction.  Gateway pays these commissions even though it did not know of or approve the affiliate's decision to place advertising with Direct Revenue.  Notice Gateway pop under (upper left corner, within a window labeled "Aurora" -- a Direct Revenue product name).

How Phishing Works  Phishing attacks appear to be from a legitimate site but are forgeries  Typically you receive an  Problem with your account  Need to verify your identify  Someone has tried to access your account so you need to verify that everything is still OK

How Phishing Works  looks authentic  Correct logos and colors  Some links may actually connect to the real site  Click on the link provided (for your convenience)  Takes you to a forgery of the real site  Actually run by phisher

How Phishing Works  Destination site looks authentic  Graphics, design, links,etc.  Some links may even work properly  User logs in  Phisher now knows username & password  You answer questions or provide information directly to the phisher  Credit card information

How Phishing Works  Results?  Identify theft  Access to your bank accounts  Examples:  Citibank Citibank  eBay eBay  IRS

Following the Phishing Money Trail  Phishers rarely work alone  Usually part of a larger criminal organization  Russian Mafia

Protecting Against Spyware  New spyware released all the time  New, updated signatures have to be constantly downloaded  Some spyware changes (morphs)  Hard to detect  Anti-spyware looks for behaviors as well as signatures

Protecting Against Spyware  Deleting spyware a complex task  Many files may be involved  Windows Registry might have to be corrected  May even require a specific program to delete some spyware  Real-time protection available  Program in memory constantly running  Watches for spyware installation signs

Protecting Against Spyware  Deleting that program doesn’t delete the spyware  Must use a spyware removal tool  Ad-Aware from  Spy-Bot Search & Destroy Spy-Bot  Spyware Remover Spyware Remover Spyware Remover