SPYWARE 2005-06 Computer Applications L6D, LAM Siu Fai (18)

Slides:



Advertisements
Similar presentations
Viruses & Spyware A Module of the CYC Course – Computer Security
Advertisements

Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
What to do with Spyware and Adware Created by Justin Leung.
What is a Firewall Anyway?
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
What is it and how to make your computer go fast again.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Spyware & Internet Security
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Learning In A Techno World How Safe is Your Cyberspace?
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
What is Malware? Definition: Definition: A generic term used to describe any form of malicious software; e.g., Virus, Trojan horse, Spyware, Adware, Malicious.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Spyware: Stealthy and Deadly
Spyware: Technical Overview
Computer Security.
Presentation transcript:

SPYWARE Computer Applications L6D, LAM Siu Fai (18)

A pproximately 90% of all computers worldwide that use the Internet have been -----or currently are----- infected with spyware.

Adware Vs. spyware

Adware Vs. spyware Password Account name

Symptoms of Spyware Infection Soooo slow –s–start up / shut down –p–programs –m–mouse response

Pesky pop-ups –large quantity of pop- up advertisements

Symptoms of Spyware Infection Home page hijack –‘home page’ changed without users’ notice New bookmarks –new web links are added to computer Unusual icons –strange shortcuts

Symptoms of Spyware Infection Automatic redialing –connect to the Internet via dial-up connection Abnormal activity –send/receive large amount of data Uninvited toolbars –strange toolbars have been added

How does spyware infect a computer? Internet advertisement File-sharing software Pirated software Fake spyware- removal programs attachments Hackers

What does spyware do? Installation of ‘keystroke logging’ program Hijack internet browser / homepage Track Internet-surfing habits Hogs system’s memory, CPU cycles & Internet bandwidth Creates its own files, cookies, DDLs, registry key…

If you think your computer is infected with spyware Don’t take chances! Scan and remove them immediately Steps –download 2 spyware-removal programs –install and update separately –scan the entire computer –remove or quarantine the found spyware –repeat with another program

Anti-spyware programs 2 types: reactive programs can remove spyware that already lurks on the computer proactive programs can prevent entry of spyware by using a virtual shield

Reactive anti-spyware programs Ad-Aware free version Spybot search and destroy

Proactive anti-spyware programs spy sweeper etrust pestpatrol McAfee antispyware