Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SPYWARE Presented by The State Security Office November 17, 2004.
What do you mean, Privacy? Sarah Gordon. In the next 20 minutes … 1. Explore some important concepts of privacy 2. Consider some of the ways in which.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 4 Personal Security
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Basic Computer Maintenance Chatham University Information Technology Team.
How to Protect Your PC Grayware Adware, Malware, Spyware.
SPYWARE  Do you know where your personal information is?
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Chapter Nine Maintaining a Computer Part III: Malware.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Security for Seniors SeniorNet Help Desk
Protecting Your Computer & Your Information
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Internet Safety LPM
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Managing Windows Security
MALWARE Autumn Mattis.
IT Security  .
Personal spaces.
Malware aka- malicious software By: Ken Fogel
Protect Your Computer Against Harmful Attacks!
Fix Gmail Temporary Error 500 Call Gmail Helpline.
Risk of the Internet At Home
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Adware and Spyware

Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide basic identification and removal resources u Discuss prevention techniques 2

Definitions, Scope, and Motivation 3

Definitions u Malware: malicious software – Adware: advertising-oriented – Spyware: information-oriented u Anti-adware and anti-spyware are the tools that fight them 4

What and Why? Adware u Advertising u Goal is to sell or promote u Data pushed from them to you u Hopefully you will buy or visit Spyware u Spying u Goal is to gather information u Data pulled from you to them u Hopefully information can be used for sale or power 5

Motivation u Money – Firms place ads for selves or clients – Paid by click-through or direct purchase – Identity/data theft u Power – Ruin rival’s reputation – Blackmail, intelligence activities – Gain notoriety and satisfaction 6

Relationships u Trojans, viruses, phishing, pharming, rootkits, adware, spyware … so much bad stuff! u Questions: – Can adware be spyware? – Is there a relationship between adware, spyware, and other malware? 7

Impact and Effects 8

u Loss of computer functionality 9

What Is This? 10Source:

Internet Explorer On XP 11 Entire screen The web page! Source:

Impact and Effects u Loss of computer functionality u Loss of computer performance u Loss of personally identifiable information 12

Impact: Identity Theft u Maricopa County u Continues to grow in frequency u Effects: – Loss of money – Credit problems – Criminal record – Inability to work 13

Technical Aspects (How It Works) 14

Some Adware Techniques u Pop-ups u Conditional acceptance u Tracking cookies (history) u Tracking images (web, ) 15

Some Adware Techniques u Click tracking u Active web technology u Careless use of protective software (or none at all!) 16

Some Spyware Techniques u Software downloads u Online games u Keystroke loggers u Pop-ups 17

Some Spyware Techniques u Free adware/spyware removal programs u Commercial software u Careless use of protective software (or none at all!) 18

Identifying and Removing 19

Identifying and Removing u Adware is everywhere 20 “Zwinky is free with download of toolbar”

Identifying and Removing u 67% infected among those surveyed* u Can you keep up? 21 * Source: Enterprise Information Systems Assurance and System Security (Warkentin and Vaughn, ed.), p. 51.

Identifying and Removing u Common symptoms* – Pop-ups – Toolbars – Performance problems – More OS/application crashes u Can be symptomless 22 * Source: Enterprise Information Systems Assurance and System Security (Warkentin and Vaughn, ed.), p. 51.

Identifying and Removing u Anti-adware tools u Anti-spyware tools u Network packet sniffing 23

Removal u Methods: – Manual – “Free” tools – Commercial tools u Can be difficult 24

Prevention 25

Prevention u What does not prevent it?* – Personal firewalls – Anti-virus programs u The best you can hope for is to discourage it. 26* But they do help prevent spyware and adware that spread that way.

Prevention u Safe browsing: – Disable active browser technologies – Limit use of cookies – Limit browsing to reputable sites – Use “high” security settings – Flush cached and personal information 27

Prevention u Anti-spyware and anti-adware – No single product or suite handles it all – Investigate tools carefully u Firewall and anti-virus – Up to date – Properly configured u Stay informed! 28

Business Aspects 29

Business Impact 1. Loss of productivity 2. Increased IT support costs 3. Theft of intellectual property 4. Liability associated with privacy violations 5. Premature information disclosure 6. Loss of credibility … 30Source: Enterprise Information Systems Assurance and System Security (Warkentin and Vaughn, ed.), p. 52.

Business Prevention u Security policy – Write it down – Educate everyone – Management buy-in – Audit compliance u Use generally good practices u Stay up to date! 31

Conclusions u Adware and spyware come with serious consequences u Identification and removal can be difficult u Prevention is best u User education is key 32

Questions? 33

Credits u Enterprise Information Systems Assurance and System Security, Warkentin and Vaughn, ed., u Wikipedia, u Original clip art is from the Microsoft Office web site unless otherwise cited 34