March 2006 Taner Erig - EMU5-1 Basic Information on Spyware and Adware n It is difficult to define spyware and adware with precision. The working definition.

Slides:



Advertisements
Similar presentations
Peer-to-Peer (P2P) Software Risks Standardized Consumer Disclosures Solution To Be Universally Applied By Complying P2P Software Suppliers Developed by.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Spyware: Legislative Responses Jody Blanke Mercer University ALSB, Ottawa August 20, 2004.
Spyware and Adware Rick Carback 9/18/2005
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Threats To A Computer Network
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Privacy Safety on the Internet. Tips on Prevention  Check to see if website is secure  A padlock icon in the corner indicates a security certificate.
How to Protect Your PC Grayware Adware, Malware, Spyware.
SPYWARE  Do you know where your personal information is?
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Quiz Review.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Managing Windows Security
COMPUTER CRIMES Presented by THABO.
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Malware aka- malicious software By: Ken Fogel
Computer Applications Unit B
How to Install Vipre Antivirus on Windows 10 PC?
AVG Antivirus is specially designed and developed for Windows and Mac computers to provide a durable protection from various threats. If you are covered.
Internet Safety for Everyone
Spyware: Technical Overview
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

March 2006 Taner Erig - EMU5-1 Basic Information on Spyware and Adware n It is difficult to define spyware and adware with precision. The working definition may be software that aids in gathering information about a person or organization without their knowledge and which may send such information to another entity without the consumer’s consent, or asserts control over a computer without the consumer’s knowledge. n For simplicity, one can refer to these types of software as Malware (as in Malicious Software).

March 2006 Taner Erig - EMU5-2 Malware - A Serious Threat n Malware is distributed in the same ways as other software; it can be downloaded from the Internet, bundled with other software, transferred via peer-to- peer (“P2P”) file-sharing networks, installed from CDs, or pre-installed on new computers. In addition, malware may be distributed by instant messaging, s, or web pages. n Malware is a serious and growing problem.

March 2006 Taner Erig - EMU5-3 Possible Damages of Malware n Can impair the operation of computers, causing them to crash and interfering with the ability of consumers to use them. n Certain ones, especially keystroke loggers, can create substantial privacy risks. n Can assert control over computers, and use that control to create security risks and cause other harms. n Malware often is more difficult to uninstall than other types of software.

March 2006 Taner Erig - EMU5-4 What Is Being Done? n The incidence of spyware can be decreased if the private sector and the government act, separately and in concert: Government and Industry Solutions n Technological solutions – firewalls, anti-adware/spyware software, and improved browsers and operating systems – can provide significant protection to consumers from the risks related to spyware.

March 2006 Taner Erig - EMU5-5 Possible Solutions n Government should: (1)increase criminal and civil prosecution under existing laws of those who distribute spyware/adware; (2)increase efforts to educate consumers about the risks of spyware/adware; and (3)encourage technological solutions. n Industry should: (1) develop standards for defining spyware and disclosing information about it to consumers; (2) expand efforts to educate consumers about spyware risks; and (3) assist law enforcement efforts.

March 2006 Taner Erig - EMU5-6 Useful Websites n Safer Networking Limited (donations welcome) n Federal Trade Commission (taxes welcome) Staff Report (March 2005) n Grisoft (purchases welcome)