COMPUTER APPLICATION READING SCHEME Presented by Diocesan Boys’ School L6A NG, K in- k wan F elix.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Spyware and Adware Rick Carback 9/18/2005
Lesson 4: Web Browsing.
A Crawler-based Study of Spyware on the Web Author: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, Henry M.Levy Presented At: NDSS, 2006 Prepared.
Chapter 4 Personal Security
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
By: Donny Gray Katrina Winters Deondrick Pina Alex Napper.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Using Windows Firewall and Windows Defender
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
How to Avoid Spyware By Hottman Computers & Consulting Co
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
S pyware refers to programs that use our Internet connection to send information from our personal computer to some other computer, normally without.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Windows Vista Configuration MCTS : Network Security.
Lesson 4: Web Browsing.
Lesson 4: Web Browsing.
Presentation transcript:

COMPUTER APPLICATION READING SCHEME Presented by Diocesan Boys’ School L6A NG, K in- k wan F elix

SPYWARE PRESENTATION A Presentation to Inform You the Ideas of What Spyware is and How it works. Through Various Examples, I Am Going To Provide You with A Clear Picture of the Complicated SPYWARE…

.: INTRODUCTION :. Definition Spyware is a general term to describe software used for Advertising Collecting Personal Information Changing the Configuration of the Computer Without Appropriate Consent

.: PURPOSES :. General Intention of Attack 1.To Deliver Unsolicited Pop-up Advertisements 2.To Steal Personal Information, including Financial Information 3.To Monitor Web-browsing Activities for Marketing Purposes 4.To Route HTTP Requests to Advertising Sites

.: DETENTION :. Discovery of Infection 1.Pop-up advertisements seen even not on the Web 2.Homepage or browser search changed without knowledge 3.Unwanted new toolbar noticed 4.Longer time needed to complete tasks 3.Sudden rise in computer crashes

.: DEVELOPMENT :. Past and Present 1.First Appeared on October 17, Used In Press With Current Meaning in Early Discovered by Steve Gibson of Gibson Research 4.First Anti-spyware, Optout Invented in One of the Biggest Security Threats in 2005 with most users not knowing its existence

.: ROUTES :. Infection Paths 1.User Installing By Own 2.Installed With Other Downloaded Softwares 3.Tricked by Fake Security Features 4.Security Holes Attacked

.: ROUTES :. User Installing By Own 1.Most Direct Route 2.Users Deceived 3.Piggybacking On Desirable Software 4.Pretending to Install Something Good

.: ROUTES :. Installed With Other Downloaded Softwares 1.A Program Downloaded 2.Additional Spyware Installed As Well

.: ROUTES :. Tricked By Fake Security Features 1.Pop-up or Dialogue Box 2."Would you like to optimize your Internet access?" Message 3.Installation Of Spyware Initiated By Any Buttons Pressed

.: ROUTES :. Security Holes Attacked 1.Spyware Author’s Web Page Forces Download 2.Spyware Author Knows Much About Anti-virus and Firewall

.: EFFECTS :. Effects of Spyware On Computers 1.Creates Unwanted CPU Activity, Disk Usage, Network Traffic, Application/System Crashes, Difficulty Connecting to Internet 2.Need to Buy Entirely New Computer System or Clean Reinstall of All Softwares 3.Multiplier Effect Leading to More Opportunistic Infections

.: EFFECTS :. Here multiple toolbars (including both spyware and innocuous ones) overwhelm an Internet Explorer session.

.: BEHAVIORS :. Behaviors of Spyware On Computers 1.Advertisements 2.Stealware and Affiliate Fraud 3.Identity Theft and Fraud 4.Spyware and Cookies

.: BEHAVIORS :. Advertisements 1.Spyware Operators Present Advertising Features For Advertisers 2.As A Purpose to Gather Information On Users’ Behaviors 3.Advertisements Overwhelming, Irritating And Offensive

.: BEHAVIORS :. Stealware and Affiliate Fraud 1.Also Known As “Click Fraud” 2.Redirect Payment of Affiliate Marketing Revenues From Legal Affiliate To Spyware Vendor 3.Affiliate Networks By Tracking Users Following Advertisement from Affiliate And Purchasing From Advertised Web Site 4.Affiliate Places a Tag On User's Request, (which Merchant Associates with Any Purchases Made) and Receives Small Commission

.: BEHAVIORS :. Stealware and Affiliate Fraud 5. Spyware Attacks Affiliate Networks By Placing Spyware Operator's Affiliate Tag On User's Activity and Replacing Any Other Tag 6. Users Harmed By Choices Deterred 7. Legal Affiliate Harmed By Redirecting Earned Income to Spyware Operators 8. Affiliate Marketing Networks Harmed By Degradation of Reputation 9. Vendors Harmed By Having to Pay out Affiliate Revenues to Affiliate Not According to Contract

.: BEHAVIORS :. Identity Theft and Fraud 1.Wire Fraud 2.Dialers Causing Computers with Modems to Dial Up a Long- distance Telephone Number 3.Massive Telephone Bills Needed 4.Users Either Pay or Contest with Telephone Company

.: BEHAVIORS :. Spyware and Cookies 1.Web Sites Set Cookies to Track Web-browsing Activities 2.User Redirected to Cookie-setting Third-party Site By Web Banner Image 3.Cookies Used to Track People's Browsing Among Various sites Carrying Ads From Same Firm and to Build Up Marketing Profile of Person or Family Using the Computer

.: REMEDIES :. Remedies and Prevention of Spyware 1.General Situation 2.Anti-spyware Programs 3.Virtual Machines 4.Other Security Measures

.: REMEDIES :. General Situation 1.Large Number of Spyware Pieces 2.Only Method - Backing Up User Data, and Fully Reinstalling Operating System

.: REMEDIES :. Anti-spyware Programs 1.Real-time Protection Preventing Installation: scans incoming network data and disk files, blocks the activity of spyware and intercept attempts to install start-up items or to modify browser settings 2.Detection and Removal: inspect the contents of the Windows registry, the operating system files, and installed programs, and remove known spyware components

.: REMEDIES :. Anti-spyware Programs 3.Updates Needed to Detect and Remove Newly-released Spyware Programs 4.Updates Done By Subscription, Installed Automatically or Manually 5.Some Relying On Historical Observation 6.By Watching Configuration Parameters and Reporting Any Changes to Users 7.Problem Still Be Reported Before New Spyware Definition Updated

.: REMEDIES :. Anti-spyware Programs 8.Spyware Mostly Working In Pairs 9.One Spyware Killed and Another One Re-generates 10.Booting Infected Computer in Safe Mode Better in Removing Persistent Spyware 11.Fake Spyware Not Removing Spyware But Adding: SpyAxe AntiVirus Gold Spyware Strike

.: REMEDIES :. Virtual Machines 1.Provide Separate Environments 2.Host Computer Unchanged If Spyware In Virtual Environment 3.Snapshots Used to Remove Private Information and Transporting Snapshot of Virtual Machine 4.More Memory and Disk Space Needed

.: REMEDIES :. Other Security Measures 1.Installation of a Web Browser other than Microsoft's Internet Explorer: alternative web browers, such as Opera or Mozilla Firefox, infected with spyware with much lower chances due to less popularity 2.Using Network Firewall and Web Proxies: network firewalls and web proxies used to block access to Web sites known to install spyware. 3.Downloading Programs Only From Reliable Sources: Cleansoftware.org, offering only software verified not to contain "nasties" such as spyware. Recently, CNet stated that it will only keep files that pass inspection by Ad-Aware and Spyware Doctor

THE END I would like to take this opportunity to give my heartfelt thanks to the followings: CHEUNG, Lily (Mrs.) TSE, CK (Mr.) LI, Gerald (Mr.) LIU, Kathleen (Ms.) for giving me so much guidance for this PowerPoint Presentation & 1. m/spyware.html m/spyware.html html software.com/threat_displ ay.cfm?name=WildTangen t&threatid= alition.org/ for the information.