1 Lab 12: Spyware A Window’s User’s Worst Nightmare.

Slides:



Advertisements
Similar presentations
Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Primary Threats to Computer Security
What is Spyware? Where did it come from?.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
COMPUTER APPLICATION READING SCHEME Presented by Diocesan Boys’ School L6A NG, K in- k wan F elix.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
SPYWARE  Do you know where your personal information is?
By: Donny Gray Katrina Winters Deondrick Pina Alex Napper.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Spyware & Internet Security
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
HijackThis - A general Homepage Hijacker Detector and Removal Tool By: Tahira Farid Project 1 Fall 2004.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
How to Avoid Spyware By Hottman Computers & Consulting Co
A Crawler-based Study of Spyware in the Web Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
SPYWARE Computer Applications L6D, LAM Siu Fai (18)
1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Adware and Spyware By Mr. Arbogast.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Why do you need to think about security?  Data loss  System loss  Identity theft.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.
S pyware refers to programs that use our Internet connection to send information from our personal computer to some other computer, normally without.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Spyware: Prevention vs. Elimination, a comparison in efficiency.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Spyware Who’s spying on you?. What is Spyware? Spyware is software or hardware installed on a computer without the user's knowledge which gathers information.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Computer Security Keeping you and your computer safe in the digital world.
How to remove Ransomware on windows 10 ?
Spyware: Stealthy and Deadly
Spyware: Technical Overview
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

1 Lab 12: Spyware A Window’s User’s Worst Nightmare

ECE 4112-Internetwork Security2 Agenda Definition The Basics Various Threats Countermeasures Prevention Techniques

ECE 4112-Internetwork Security3 Definitions “Any software which employs a user’s Internet connection in the background without their explicit permission.” “Consists of computer software that gathers and reports information about a computer user without the user's knowledge or consent”

ECE 4112-Internetwork Security4 Who uses Spyware? Marketing Companies  Retrieve Consumer Data Criminals  Identity Theft  Sell Credit Card Numbers  Steal Passwords

ECE 4112-Internetwork Security5 Who uses Spyware? Monitoring:  Parents monitoring their children  Businesses monitoring employees  Government monitoring citizens Freeware  Generate Revenue from Advertising

ECE 4112-Internetwork Security6 The Problem Over 85% over PC’s have Spyware Spyware Includes:  Adware  Key Loggers  Data Miners

ECE 4112-Internetwork Security7 Various Threats Hijacking Spyware: Takes Over Internet Explorer  Often in the form of a toolbar  Changes homepage  Redirect traffic to advertisers  Popup targeted ads

Severely Hijacked Browser

ECE 4112-Internetwork Security9 Known Offenders Kazaa  Currently biggest propagator of Spyware  Installs: New.net, Onflow, Cydoor, etc. Gator/GAIN  Tracks user’s internet activity and reports back  Delivers targetted popups

ECE 4112-Internetwork Security10 Known Offenders WeatherBug BargainBuddy Even Big Companies:  Microsoft’s Windows Media Player  RealNetworks’ RealPlayer – Both of these record and transmit info about the music the user is playing

ECE 4112-Internetwork Security11 Anti-Spyware Packages Ad-Aware SpyBot Search & Destroy Microsoft Antispyware Hijackthis

ECE 4112-Internetwork Security12 How Spyware is Detected Similar to Viruses/Worms Spyware Signature  Signature of Files  Hash of Running Processes  Signature of Registry Entries Must keep definition files up to date

ECE 4112-Internetwork Security13 How Spyware is Removed Automatic Removal with Anti-Spyware  Doesn’t always work Manual Removal  Often requires help from a Spyware database  Kill processes  Delete registry entries  Delete files

ECE 4112-Internetwork Security14 Security Settings Disable ActiveX Disable Java Disable Scripting Disable Popups Don’t use Internet Explorer  Use Firefox

ECE 4112-Internetwork Security15 Common Sense A lot of Spyware comes packaged with shareware  Read the EULA to see if any hidden programs are installed  Check an online Spyware database  Read user reviews

ECE 4112-Internetwork Security16 What you will do in the Lab Install and Use Anti-Spyware Utilities  Ad-Aware, SpyBot, Hijackthis Install Spyware  Bundled Spyware – Gator  WeatherBug  Analyze EULA of Spyware

ECE 4112-Internetwork Security17 What you will do in the Lab Analyze Spyware Footprints  Registry entries  File contents Analyze a Scripting Vulnerability  IE Default Security Settings Block Spyware Traffic  Edit Windows host file

ECE 4112-Internetwork Security18 Resources d-spyware-cais2004.pdfhttp://web.njit.edu/~bieber/CIS677F04/staffor d-spyware-cais2004.pdf