Presentation is loading. Please wait.

Presentation is loading. Please wait.

Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.

Similar presentations


Presentation on theme: "Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007."— Presentation transcript:

1 Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007

2 SPYWARE Is software that collects your personal information about your user habits without your consent. Is software that collects your personal information about your user habits without your consent.

3 Techniques Logging Keystrokes Logging Keystrokes Recording Internet Web Browsing History Recording Internet Web Browsing History Scanning Documents on the Computer’s Hard Disk Scanning Documents on the Computer’s Hard Disk

4 Purpose Purposes range from overtly criminal ( the theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources Purposes range from overtly criminal ( the theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources

5 Adware Is any software application in which advertising banners are displayed while the programming is running Is any software application in which advertising banners are displayed while the programming is running The ads can be viewed through pop-up windows or through a bar that appears on a computer screen The ads can be viewed through pop-up windows or through a bar that appears on a computer screen

6 Malware Is a type of programming intended to cause harm Is a type of programming intended to cause harm Malware is designed to send itself from your e-mail account to all the friends and colleagues in your address book Malware is designed to send itself from your e-mail account to all the friends and colleagues in your address book

7 Infection Results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss if user and client confidence Results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss if user and client confidence

8 Common Types of Malware Viruses Viruses Worms Worms Trojans Trojans Spyware Spyware Browser Hijackers Browser Hijackers

9 Prevention Programs have been developed in order to detect, quarantine, and remove ad- ware as well as spy-ware Programs have been developed in order to detect, quarantine, and remove ad- ware as well as spy-ware Keep up-to-date security patches and operating system updates from Windows Update Keep up-to-date security patches and operating system updates from Windows Update

10 Prevention Use an alternative web browser Use an alternative web browser Install ad-blocking software Install ad-blocking software


Download ppt "Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007."

Similar presentations


Ads by Google