Spyware.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Lydia Snowden.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
Viruses & Destructive Programs
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
ARE THE FOLLOWING SITUATIONS ETHICAL?. Your new computer comes with Microsoft Office 2003 already installed on it. Included in your box of software is.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
APPLICATION SOFTWARE. Application Software  Application softwares are those softwares, which have been developed to solve a particular problem, to perform.
James Page Information Security. Levels of Data  Level 3  Publicly available data  Level 2  University Sensitive data  Student Records  Employee.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Online Safety 2.02 Remember the rules of online safety.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
At the end of each day the evening manager at each store enters a code into the cash register, after which the cash register connects to the central computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Technology Timpview High School
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Important Information Provided by Information Technology Center
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
2.02 Remember the rules of online safety.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Handling Personal Data
Remember the rules of online safety.
Protect Your Computer Against Harmful Attacks!
2.02 Remember the rules of online safety.
Robert Leonard Information Security Manager Hamilton
“CYBER SPACE” - THE UNDERGROUND ECONOMY
BCT 2.00 Analyze Technology Issues
Internet Safety Vocabulary
Stay Safe While Using The Internet
Unit 6 Digital Literacy Study S3 Obj 2-2
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 6 Digital Literacy Study S3 Obj 2-2
What devices use the internet?
Presentation transcript:

Spyware

WHO ARE THEY? Programs that secretly record what you do on your computer. They can be used for some perfectly legitimate purposes, but the majority of spyware is malicious. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters.

How they work? When you browse on the internet you can get spyware ‘’accidentally’’ or you can download in with the file you want to get. They work quietly so you never know whether you have it or not. They're often distributed as 'shareware' or 'freeware' with minimal license restrictions in order to trap as many people as possible.

How to defeat them? You can use anti-spyware programs. You can try not to install/download a spyware. Source: http://www.bbc.co.uk/webwise/guides/about-spyware