1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Primary Threats to Computer Security
What is Spyware? Where did it come from?.
SPYWARE Presented by The State Security Office November 17, 2004.
What to do with Spyware and Adware Created by Justin Leung.
What is a Firewall Anyway?
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
AVG Internet Security 7.5 Product presentation.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
SPYWARE  Do you know where your personal information is?
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Explorer Browsing & Windows XP Service Pack 2 What is Service Pack 2? The newest update for Windows XP which aims to make your computer more secure.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Chapter 5: System Software: Operating Systems and Utility Programs.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Data Security.
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
Using Windows Firewall and Windows Defender
Learning In A Techno World How Safe is Your Cyberspace?
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
How to Avoid Spyware By Hottman Computers & Consulting Co
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Module 8 : Configuration II Jong S. Bok
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Spyware Who’s spying on you?. What is Spyware? Spyware is software or hardware installed on a computer without the user's knowledge which gathers information.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Maintaining and Updating Windows Server 2008 Lesson 8.
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Spyware: Stealthy and Deadly
What is a Firewall Anyway?
Contact QuickBooks File Doctor
Is your computer being used against you while you sleep?
Bethesda Cybersecurity Club
Presentation transcript:

1 Protect Against Spywares – SpywareBlaster

2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection -- SpywareBlaster Evaluation & Conclusion

3 Introduction Prevention is better than cure – SpywareBlaster prevents the installations of spywares as well as the running of the installed spywares

4 What is spyware? According to spywareinfo.com, spyware is software or hardware installed on a computer without the knowledge and the consent of the users. These components gather information about the user for later retrieval by whoever controls the spyware. If the spywares aim at marketing some product or services, they are called adware.

5 Danger The threat can be categorized as follows:- Annoyance; profile users, fairly easy to remove Threat; profile users and broadcast data back to a server, removal is not easy Dangerous; logs activity, open communication ports, difficult to remove, may contain security flaw and/or anti-spy counter measures Extremely dangerous; logs activity, open communication ports, high possibility of potential system damage or security flaw, may attempt to disable anti-virus or firewall programs.

6 Sign of Trouble System is slow Mysterious new toolbar in browser Advertising windows pop up even when not browsing the web Surprise 900-number charges on phone bill

7 Solution Game plan:- - clean up the system (with Spybot) - take a snapshot of the system in its clean state - run SpywareBlaster to protect the system - periodically restore the system to its clean state to preserve integrity

8 Cleaning with Spybot A free software from to detect and remove spywares Allow recovery Provide immunization

9 I. Search and destroy

10 List the problems found

11 The result is colour-coded Red entries – problems that should be fixed to avoid security and/or privacy problems Black entries – system internals, better remain untouched Green entries -- indicate usage tracks, may be removed.

12 Remove the threats Select Fix selected problems

13 System is cleaned

14

15 II. Possible recovery A list of back-ups is provided.

16 III. Immunization To prevent future spyware installation

17 Protection -- SpywareBlaster SpywareBlaster creates a snapshot (an image of various browser and system settings) of the computer in its clean state. Protect the system from installation of spywares and action of installed spywares by setting a “kill bit” for spyware ActiveX controls Snapshot can be restored, changes and additions detected will be reported to provide full control

18 1. Creating a snapshot Run SpywareBlaster. Select System Snapshot then Create a System Snapshot Choose a meaningful name for the snapshot such as after_cleaning, nothreat, and etc.

19

20

21 2. Protect the system Current list of problematic spywares and tracking cookies is provided. The ones displayed in red are the one that the computer is not protected against. User can choose the ones to be protected against. Press “Select All” or manually make the selection. Press “Protect Against Checked Items” button.

22

23 Information about the spyware/cookies is available. Select More Info on Items

24 3. Restoring the system Select System Snapshot choose Restore system Snapshot

25 Select a snapshot

26 Changes and additions will be reported

27 4. Other options Settings

28 Tools 1. Brower Pages – allow changes to the settings

29 2. Hosts Safe – Encrypted backup copies of the Hosts file. Can be restored by “Restore Saved Backup

30 3. Misc. Internet Explorer Settings – edit Internet Explorer settings

31 4. Flash Killer – Provides the option to set the kill bit for the Macromedia Flash control (versions 4.x, 5.x, or 6.x).

32 5. Custom Blocking – Allows customization of the list of ActiveX controls to be blocked.

33 Updates SpywareBlaster can be effective only if the threats are known, thus it is important to update the database frequently

34 Information on spyware/adware Wilders.org  SpywareInfo  Doxdesk.com 

35 Evaluation SpywareBlaster can protect a system only if it is possible to reach the clean state, not contaminated by surveillance programs. Spybot Search & Destroy was known to be unable to find and remove keyloggers. 1

36 Conclusion Spywares, or serveillance programs, remain a major security issue. They are capable of invading a computer system, tracks users’ keystrokes and thus gain control of the systems. The Software principles Yielding Better Levels of Consumer Knowledge (SPYBLOCK) Act was introduced in US Congress. The act would make downloading and installing software without alerting the user illegal.2

37 Critics would like to add provision to provide avenue for the users to take legal actions against companies that create and use spywares. The Federal Trade Commission plans a workshop on spyware in mid-April !!

38 References 1. Scott Spanbauer, “Fight Back Against Surveillance Software”, PC World Magazine, April 2004 issue (Posted Thursday, February 26, 2004). 2. Adrienne Newell, “Anti-Spyware Law Proposed”, Medill News Service, February 26, 2004