COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SPYWARE Presented by The State Security Office November 17, 2004.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Introduction to Security Computer Networks Computer Networks Term B10.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
March 2006 Taner Erig - EMU5-1 Basic Information on Spyware and Adware n It is difficult to define spyware and adware with precision. The working definition.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
By Hyrum Wines  2. Anti-spyware: A spyware is a program which collects private information and sends it to its programmer. Spywares are considered.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Malicious Software.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Three Things About Malware
3.6 Fundamentals of cyber security
The Internet of Unsecure Things
Malware CJ
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
An overview over Botnets
Presentation transcript:

COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University

Roger Thompson Communications of the ACM, August, 2005 Native Australian, now in the USA Chief Research Officer for AVG Leads a global team of security researchers Previously headed the malware research operations for security industry leaders ICSA, PestPatrol and Computer Associates (CA). Speaks widely on computer security and forensics issues. Check out his blog:

Malware - Definition Malware - short for malicious software Designed to infiltrate or damage a computer system without the owner's informed consent A variety of forms of hostile, intrusive, or annoying software or program code: – computer viruses, worms, trojan horses, most root kits, spyware, dishonest adware, crimeware

Spyware – Definition Spyware – any software intended to aid an unauthorized person or entity in causing a computer, without knowledge of the computer’s user or owner, to divulge private information.

Spyware – A Relentless Onslaught Spyware is software that is installed on a computer and collects information without the user’s knowledge Sometimes it is installed by the owner of a shared, corporate, or public computer to secretly monitor users Can collect various types of personal information, such as Internet surfing habits and sites that have been visited Can interfere with user control of the computer in other ways, such as: – installing additional software – redirecting web browser activity – changing computer settings – forcing alternative software to execute

Spyware Dangers “Phone home” – sends info on user and her/his actions to a third party – used for spam / pop-up campaigns Open a computer to a remote attacker – RAT = Remote Access Trojan Capture keystrokes and send it to theif/blackmailer Hijack computer for illegal use – armies of software robots = Botnets, denial-of-service attacks Probe system for access to files

Spyware Harms Computer Perfromance Seriously degrades computer performance If you computer is taking a long time to boot, it is likely because of Spyware If your webpages are taking longer to load it is likely do to Spyware Seconds lost per transaction adds up to big costs

National Security Threats Some Spyware is designed to steal UIDs and passwords When of the greatest corporate and national threats in existence today Botnets = armies of distributed software robots Able to hijack large numbers of person computers Orchestrated, a Botnet can be a powerful force on the Web - DDoS

Botnet A collection of software robots, or bots, that run autonomously and automatically and distributed over a computer network A bot typically runs hidden, uses a covert channel to communicate with its command and control server(s). Newer bots automatically scan their environment and propagate themselves using vulnerabilities The process of stealing computing resources via "botnet" is sometimes referred to as "scrumping.“ Estimated that up to one quarter of all personal computers connected to the internet may be part of a botnet: – The Dutch police found a 1.4 million node botnet – Norwegian ISP Telenor disbanded a 10,000-node botnet.

Fighting Back A combined effort is needed, three lines of defence: 1: Education and protection – Education of organizations and individuals on preventative measures – COAST – Consortium of Anti-Spyware Technology – Use of protective anti-Spyware software

Fighting Back 2: Disclosure Legislation – Identification of all installed software – Ease of removal of software – Transparent disclosure of all impacts on computer – Allows users to make decision on use and to take action

Fighting Back 3: Aggressive Prosecution – Laws against consumer fraud and idenituy theft cover Spyware acts – Law enforcement must be encouraged to take action – International law enforcement co-op needed 4: Planning – For DDoS from Botnets – Gov’t, ISP, corporate and international co-op needed