1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Basic Communication on the Internet:
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
What is a Firewall Anyway?
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Free Tools for Safe Computing Ed Greenberg ASU College of Nursing August 20, 2003.
What is it and how to make your computer go fast again.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Protecting Your Computer & Your Information
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Chapter 8 The Internet: A Resource for All of Us.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
The Web Wizard’s Guide to Freeware/Shareware Chapter One Software on the Internet.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Understand Malware LESSON Security Fundamentals.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
How to remove Ransomware on windows 10 ?
Botnets A collection of compromised machines
Managing Windows Security
Internet Business Associate v2.0
Chapter 3 Installing and Learning Software
Botnets A collection of compromised machines
Spyware. By: Katheryn L. Gaston.
Spyware: Technical Overview
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
What is a CMS. CMS is content management system CMS is a software that stores content.
What is keystroke logging?
SysKit Security Manager
Presentation transcript:

1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005

ECE Internetwork Security 2 Overview What is Spyware? Examples of Spyware Spyware prevention techniques Spyware detection and removal Tools explored in the lab

ECE Internetwork Security 3 What is Spyware? Spyware is a piece of software intended to monitor computer usage  This data can be collected anonymously for statistical purposes or with knowledge of whose usage they are tracking Spyware comes in basically two flavors  Commercial Spyware  Subversive Spyware

ECE Internetwork Security 4 Commercial Spyware Commercially sold products for monitoring computer usage These include mostly keyloggers and similar monitoring software This software is intended to be used in legitimate situations such as monitoring employee computer usage but has a large potential for abuse

ECE Internetwork Security 5 Subversive Spyware Software usually bundled with legitimate useful software for tracking computer usage In most cases this is technically legal because it is disclosed in the End-User License Agreement Despite the legality a large amount of spyware uses underhanded tactics  Confusing wording in the EULA  Often doesn’t disclose spyware “up front” and relies on people not reading the EULA

ECE Internetwork Security 6 Where is Spyware found? Spyware is most often found in Downloading/Sharing utilities and Media players Spyware is almost always associated with free software

ECE Internetwork Security 7 A Few Examples of Spyware BonziBuddy  Monitors user searches  Provides Targeted Ads Bearshare  SaveNow –Bundled with Bearshare –Collects User Information –Provides Targeted Ads Alexa Toolbar  Collects User Data  Provides Targeted Content

ECE Internetwork Security 8 How Spyware Works Varies from Program to Program Some programs only send aggregate statistical data Others associate data to a unique ID called a Global User ID (GUID)

ECE Internetwork Security 9 How Spyware Works Spyware “phones home” with usage data Vendors store this data and often use it to send targeted advertising Diagram Courtesy of Symantec (see references)

ECE Internetwork Security 10 Is Spyware legal? Technically yes. Many if not all Spyware programs include End-User License Agreements (EULA) which a user must accept to install the software  These agreements disclose the nature of the spyware bundled with the software  However the legality of many of these EULAs is being contested –They are often verbose, ambiguous, and full of legalese –Most users are completely unaware they are using spyware in their applications

ECE Internetwork Security 11 Is Google and GMa Spyware? Recent Controversy has arisen over Google’s Popular new service GMail  GMail provides targeted ads based upon the content of your Google also keeps a GUID for it’s users which is maintained across search, mail, and other services

ECE Internetwork Security 12 Google’s Position Google claims it protects user’s privacy by claiming  It will not reveal information to 3 rd parties  It’s targeted ads are “better” than non- targeted ads  Scanning of for ads is a completely automated process  is already scanned for spam and virus detection

ECE Internetwork Security 13 EPIC’s position on GMail Users who send mail have not agreed to Gmail’s EULA Google’s GUID tracks users across it’s services Google encourages users to keep indefinitely and makes it very difficult to delete Google has a rather vague privacy policy  This policy can be changed without notice  Google reserves the right to share information collected about you amongst it’s services to “improve the quality of service”

ECE Internetwork Security 14 Spyware prevention techniques Awareness  Be knowledgeable and conscious of software with spyware bundled –Check Known Spyware Lists such as Application protection programs  These are programs that prevent programs from running that are not on a baseline list you set without your consent  One such application is BlackICE from ISS

ECE Internetwork Security 15 Spyware detection Even the most cautious computer user is likely to have spyware installed on his or her computer Many solutions exist to detect spyware these include  XRayPC  Ad-Aware  Spybot Search & Destroy

ECE Internetwork Security 16 Spyware removal Removal of spyware can be accomplished either automatically or manually The Automated method includes the use of programs like Ad-Aware and Spybot Manual removal often requires editing registry keys, deleting files, or even replacing system files

ECE Internetwork Security 17 Automatic Spyware Removal Automated removal utilities are often quick and easy to use but can sometimes be ineffective in removing all spyware Particularly devious spyware is often only completely removed manually

ECE Internetwork Security 18 Manual Spyware Removal Most spyware programs have well documented procedures for manually removing them Often this documentation is provided by independent spyware sites but occasionally the manufacturer provides such information The procedure for manual removal is often fairly complex and time consuming

ECE Internetwork Security 19 Lab: Commercial Spyware In the lab we will be using XPCSpy which is a full-featured Keylogger available as a free trial This logger tracks all activities on a computer including keys typed, programs ran, web sites visited, and more XPCSpy has the option of transmitting logs via FTP which will be explored in this lab

ECE Internetwork Security 20 XPCSpy Detection Detection of this software is rather easy as it is designed for legitimate use and doesn’t have a high need for secrecy The FTP transfer of logs is a particular weakness of this software as no encryption is used

ECE Internetwork Security 21 Lab: Subversive Spyware For this portion of the lab we will use Gator and BonziBuddy In both cases spyware is bundled with useful applications Detection and removal of this software is done with automated utilities Ad-Aware and Spybot

ECE Internetwork Security 22 Summary Spyware is software that collects computer usage data.  Two Types: –Commercial: Commercially sold products such as keyloggers –Subversive: Bundled with software often unknown to the user Dealing with Spyware  Prevention (Awareness and Application protection)  Detection (Ad-Aware, Spybot, XRay-PC)  Removal (Manually, Ad-Aware, Spybot)

ECE Internetwork Security 23 References Post, André. The Dangers of Spyware. Symantec Security Response. nger_of_spyware.pdf nger_of_spyware.pdf Gmail Privacy FAQ. Electronic Privacy Information Center. GMail and Privacy. Spyware Guide.