Joe Klemencic 2006. Spyware is a type of program that watches what users do with their computer and then sends that information over the internetprograminternet.

Slides:



Advertisements
Similar presentations
June 2008 Surf Safely with a Clean Computer Roger Thornburn.
Advertisements

Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Joe Klemencic %+ Number of machines on the Internet infected with Spyware * source: TechNewsWorld.
Computer Security What to Know and What to Do Presented to CUGG Jamie Leben IT-Works Computer Services
Primary Threats to Computer Security
Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
Keeping Your Identity Your Own Amy Ginther, Project NEThics Coordinator OIT Town Meeting August 24, 2005.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Chapter 7: The Web and 1 The Web and Chapter 7.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
The OWASP Foundation OWASP Chennai Phishing.
How It Applies In A Virtual World
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Security for Seniors SeniorNet Help Desk
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Internet Safety Internet Safety LPM
XP Browser and Basics COM111 Introduction to Computer Applications.
Internet safety By Suman Nazir
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
Staying Safe on the Internet CSAD /11/2007 Joe Klemencic & Tim Rupp.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Windows Tutorial 5 Protecting Your Computer
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Joseph J. Malone Security for Seniors Joseph J. Malone
Unit 4 IT Security.
Personal spaces.
ISYM 540 Current Topics in Information System Management
Unit 11 Using the Internet & Browsing the Web
Unit 12 Using the Internet & Browsing the Web
Challenges We Face On the Internet
Internet and security.
Protect Your Computer Against Harmful Attacks!
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Internet Safety – Social Media
Phishing, Pharming, and Spam
Presentation transcript:

Joe Klemencic 2006

Spyware is a type of program that watches what users do with their computer and then sends that information over the internetprograminternet 80%+ Number of machines on the Internet infected with Spyware Source: CA.com

AdwareHijackersTrojan ToolbarSpywareDownloaders

93 Items Number of Spyware items on average * source:

Order of 1 lamp for John Doe submitted. Cookie: John Doe ordered 1 lamp John Doe likes lamps While searching for Star Wars items, we noticed that you also like lamps.

=

if INSTALL_BUTTON is clicked{ install malware.exe } if NOTHANKS_BUTTON is clicked { install malware.exe anyway // Bwhahaa!!! } If this is a REAL Windows dialog box, use the X to close –OR- use your browsers BACK button.

In this case, the entire dialog box is really a Graphic image. No matter where you click, it will install malware. if MOUSECLICK { install malware.exe }

Read Everything!!

Phishing

Source: AntiPhishing.org

*Source: USA Today Identity Theft: Not limited to relatives or physical theft of personal information (drivers license, credit cards). Most Identity Theft occurs NOT from your on-line transactions, but rather from locally installed software watching your computer OR from compromised machines at the various merchants and banks. Just because a web site uses SSL or states it is a Secure Server does NOT guarantee your data is safe. All it means is that the communications between your machine and the web site is encrypted (or at least is supposed to be). Many banks will NOT honor their fraud policies if the ID theft was due to Phishing.

PHARMING (Hijacking Hosts/DNS) c:\windows\system32\drivers\etc\hosts or /etc/hosts home.msn.com mail.yahoo.com

Cleanup and Prevention

Dont click on everything that pops up in front of you and READ the messages!!! If unsure, visit a different site.

Hijack your own windows\system32\drivers\etc\hosts file: ad.doubleclick.net ad.preferences.com ads.doubleclick.com ads.infospace.com ads.msn.com Make your hosts file Read Only:

Spyware and Phishing Resources Current Phishing Scams: Spyware Discussions: Hoax: CA.com Resources: Identity Theft Resource Center

theend