SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,

Slides:



Advertisements
Similar presentations
Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
What is a Firewall Anyway?
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Security, Privacy, and Ethics Online Computer Crimes.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Report to Mining Management on: Recommendation for Anti-Spyware to be installed in six (6) Personal Computers in the Mine Site Office.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Internet Security and Your Computer Welcome to Boot Camp.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Managing Windows Security
3.6 Fundamentals of cyber security
IT Security  .
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Phishing, Pharming, and Spam
Presentation transcript:

SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy, security and performance, but possible legal and criminal liabilities. The best defenses against spyware are education, awareness and careful reading of license agreements prior to installation of any software.

SPYWARE Spyware is not a virus; behaves more like a Trojan horse. Typically, no data is damaged Spyware runs quietly in the background without your knowledge Spyware forwards information about you, your surfing habits, and data from your computer to the spyware’s owner.

SPYWARE Definition: Spyware is “ware” that spies on you Or Any software that covertly gathers user information through the user’s Internet connection without your knowledge, usually for advertising purposes

SPYWARE Two types of spyware based on functionality: 1. loggers-runs silently in the background and records activities like key strokes and mouse clicks on your computer; data can be played back to reconstruct what you’ve done. Can steal passwords and credit card numbers.

SPYWARE Two types of spyware based on functionality: 2. trackers-monitor usage habits and store them as statistical data for reporting. Data typically used to track your surfing habits.

SPYWARE How does your computer get spyware? 1. generally, from free downloads like Kazaa or free game programs (bundles the spyware with the “free” download) 2. visiting a web site 3. viewing The downloads from a web site or may require you to click to view the site; when you click, you authorize a download.

Spyware In a U.S. securities filing, it was disclosed that the Kazaa file-swapping program had quietly bundled software from Brilliant Digital Entertainment that would create a P2P distribution network what when activated used the individual users’ bandwidth, drive space and process cycles to distribute paid commercial content and run computing tasks for Kazaa.

Spyware Possible problems caused by spyware includes: Web accessing slow down Computer locking up System start up problems Windows not shutting down properly Computer slow down because of all the applications running in the background.

Spyware Countermeasures Set “cookies” preference Install pop-up blocker Install Spybot or Adaware Install a firewall and monitor outgoing activity