Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.

Slides:



Advertisements
Similar presentations
Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Spyware and Adware Rick Carback 9/18/2005
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Threats To A Computer Network
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
How to Protect Your PC Grayware Adware, Malware, Spyware.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Spywares By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of technology (NYIT)-Jordan’s campus 2006.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Protecting Students on the School Computer Network Enfield High School.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Report to Mining Management on: Recommendation for Anti-Spyware to be installed in six (6) Personal Computers in the Mine Site Office.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Any criminal action perpetrated primarily through the use of a computer.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Managing Windows Security
IT Security  .
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Protect Your Computer Against Harmful Attacks!
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION

OBJECTIVES What is spyware Who creates spyware How spyware operates Common spyware forms Impact of spyware Recommendations 2

W HAT IS SPYWARE Spyware is one type of malicious software (malware) that collects information from a computing system of a person or organization without their knowledge and then send such information to the creator of the spyware. Spyware can capture keystrokes, screenshots, visited sites, internet usage habits and other personal information. 3

W HO CREATES SPYWARE Online attackers Marketing organizations 4

5 H OW SPYWARE OPERATES Basic forms of spyware can be picked up simply by visiting a Web page, through , or downloading software especially “ freeware ” and “ shareware ”. Many software downloads are “free”, but within the End User License Agreement (EULA) are provisions to use information from your computer or your and other contact information. You have to agree to the EULA to download or install, so you essentially agree to allowing someone else to use information about your computer. More spyware will reset your browser's home page, change the service your browser uses for Web searches, or add new sites to your favorites list.

6 E ND U SER L ICENSE A GREEMENT

7 POP-UP

8 C OMMON SPYWARE FORMS Browser hijacking Tracking cookies False antispyware tools Autonomous spyware Keylogger

9 B ROWSER HIJACKING This class of spyware attempts to modify the users browsers setting. Hijacking spyware can be installed in various ways. These redirects lead users to advertisements that earn the hijacking commissions when they are visited.

10 C OOKIES AND WEB BUGS - Cookies are small pieces of information stored on a user’s system by a web server. During subsequent visits often, cookies are used for storing user authentication, preferences, and other type of user information. - They can be used to track a user across multiple websites.

11 F ALSE ANTISPYWARE TOOLS Applications available on some internet sites advertise themselves. As spyware detection or removable tools. In fact they themselves are spyware.

12 A UTONOMOUS SPYWARE Autonomous spyware is malicious application, it can be designed to perform any type of spying functions. Autonomous spyware operates as a separate process or injects itself into other processes running on your system. This type of spyware often starts up when you log onto your computer and can frequently access anything on your system.

13 KEYLOGGER Designed to record all keystrokes of users in order to find passwords, credit card numbers, and other sensitive information. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorized reception.

14 Aside of ethics and privacy, spyware steals computer's memory resources and also uses bandwidth as it sends information back to the spyware's home via the user's Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability. Spyware is known to change computer settings, resulting in slow connection speeds, loss of Internet or functionality of other programs. Increase in system crashes. I MPACT OF SPYWARE

15 Spyware have the ability to monitor keystrokes, scan files on the hard drive, Or install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying such information back to the spyware author who will either use it for advertising/marketing purposes or sell the information to another party. I MPACT OF SPYWARE

16 R ECOMMENDATIONS Don't install any application unless you are certain of what it does or where it came from. Avoid clicking advertised popups especially ones that mention “free” stuff if possible. Use trusted softwares. Always read the license agreement Software and OS upgrades Utilize browser’s security settings Pop-up Blockers Open Firewall Filters Use Anti-Spyware Spy Sweeper Microsoft Windows Anti-Spyware Spyware Doctor

SUMMARY 17

18 T HANKS FOR LISTENING