SPYWARE Presented by: Deb Neese, City of Phoenix January 20, 2005.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
How to Keep Your PC Running Like New Bryan Nowak.
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
How to maintain your computer St. John UMC Computer Classroom.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Chapter 4 Personal Security
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
James Tam Computer Security You will learn about some common computerized security threats as well as some ways of minimizing these threats.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Avira AntiVir Premium Kaiyu Wang. About the Avira AntiVir Premium The Avira AntVir from German. It just has 30MB, but it can kill 1,600,000 virus Fust.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Chapter Nine Maintaining a Computer Part III: Malware.
 Norton Antivirus, developed and distributed by Symantec Corporation, provides malware prevention and removal during a subscription period. It uses signatures.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
How to maintain your computer
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Surfing Through the World Wide Web Safe Surfing Through the World Wide Web The World Wide Web connects people from all over the world. The Web allows.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
PC Maintenance How to keep your computer healthy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Security Insights: Spyware. Spyware Challenges Bombard you with ads Change system settings Collect personal information Slow down or crash computers Invade.
Report to Mining Management on: Recommendation for Anti-Spyware to be installed in six (6) Personal Computers in the Mine Site Office.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Two Types of Software.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
Windows Vista Configuration MCTS : Network Security.
Windows Tutorial 5 Protecting Your Computer
Presentation transcript:

SPYWARE Presented by: Deb Neese, City of Phoenix January 20, 2005

TOPICS FOR DISCUSSION  What is Spyware  Spyware management  Anti-Spyware market maturity  City of Phoenix approach to managing Spyware

What is Spyware? Any software communicating across the Internet that makes silent background use of an Internet “backchannel” connection without the prior complete and truthful disclosure of proposed backchannel usage, followed by the receipt of explicit, informed, consent for such is SPYWARE.

Types of Spyware Browser HijackAdware TrojansProfiling Cookies Web BugsDialers Keyboard LoggersDroneware and Trackware

Where Does Spyware Come From? Spyware is often embedded within: Popular so-called freeware/adware programs Action Type Elements within Web Pages

Spyware Delivery Methods Drive-by Download—while user’s surf the net, they are lured to download programs by claims pretending to be legitimate that will enhance the browsing experience, or SPAM mail which include Internet Links

In most cases, Spyware is inadvertently or silently installed

Most Common Symptoms of Spyware Installed on a PC PC is running “slow” User is experiencing a large number of Pop-Up Ads

Spyware Management Industry standard recommendation for managing Spyware is to follow the same approach used to manage virus protection. Redundancy

Spyware Management (con’t) Use a combination of products: Endpoint, perimeter software that proactively prevents Spyware from being installed Desktop level software to scan for existence of then to remove

Anti-Spyware Market Maturity Market has not fully matured Very few enterprise class products available for prevention 100+ desktop products—many of them touted as untrustworthy or questionable

Marketing Trend Analysis Most analysts, anti-spyware vendors, and antivirus companies have said they expect antivirus and anti-spyware to merge, since customers ultimately want an all-in-one way to nuke everything from viruses and worms to spam and spyware.

Anti-Spyware Legislation Bill Numbers 2929 and 4661 Will join the Can Spam Act Have passed the House Judiciary Committee and are expected to pass the Senate in the 109 th Congress

Microsoft Anti-Spyware Product MicrosoftAcquiredDecember 2004 Giant Anti-Spyware Company Microsoft ReleasedJanuary 2005 Beta “Potentially Unwanted Software” Anti-Spyware Product

City of Phoenix Spyware Management Endpoint Prevention Desktop Anti-Spyware software upon demand Scheduled upgrades in other desktop products will assist by providing scanning and removal features

Inbound Internet November SPAM/Spyware Scanning Prevention Software Implemented Outbound Internet January 2005 Access Filtering Service Scheduled to be Implemented Endpoint Prevention

City staff estimate that a very large % of all Spyware may be prevented following implementation of both of these products/services. Endpoint Prevention (con’t)

Desktop Spyware Management (con’t) Desktop level scanning and removal Anti- Spyware product used upon demand-- when it is suspected that a PC is infected

Scheduled Software Upgrades that will also assist in Spyware Management Windows XP ServiceJanuary 2005 Pack 2 certified for use Symantec Version 9 Spring 2005

Questions/Comments