Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Primary Threats to Computer Security
What is Spyware? Where did it come from?.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Spyware Response At Cornell IT Security Office Steve Schuster.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Windows Malware: Detection And Removal TechBytes Tim Ramsey.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Free Tools for Safe Computing Ed Greenberg ASU College of Nursing August 20, 2003.
What is it and how to make your computer go fast again.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet Security. A computer virus is an executable file designed to replicate itself while avoiding detection.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Learning In A Techno World How Safe is Your Cyberspace?
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Internet Security and Your Computer Welcome to Boot Camp.
Safety and Security issues of using ICT Alys brooks.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
What is Spam? d min.
Keeping Your Computer Safe and Running Efficiently.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Internet safety By Suman Nazir
Computer Essentials by Mark White. Computer Essentials Firewalls Anti-Virus Software Spyware Adware.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T

Agenda What is Spyware and why is it a problem What is Spyware and why is it a problem Is it all bad? Is it all bad? How do I get Spyware? How do I get Spyware? What to do about Spyware today? What to do about Spyware today? How to avoid getting Spyware? How to avoid getting Spyware? When will it get better? (Soon ) When will it get better? (Soon )

What is Spyware and why is it a problem Microsoft’s Definition Microsoft’s Definition –Spyware and other unwanted software refers to software that performs certain tasks on your computer, typically without your consent. This may include giving you advertising or collecting personal information about you. Exposes (or potential to expose) Private Information: Exposes (or potential to expose) Private Information: –Credit Card # (Bank Accout Numbers) –SSN –Usernames & Password –Address Book (to SPAM)

Is all Spyware Bad? A lot of Spyware is not intentionally malicious, but… A lot of Spyware is not intentionally malicious, but… –Causes system problems –Hard to remove –Collects info that another program could grab –Show Ads (some people enjoy Ads) Dependent on Personal Opinions Dependent on Personal Opinions

How do I get Spyware? Installing software from unknown sources Installing software from unknown sources –“Free” versions of commercial software –Freeware from untrusted sites or mirrors Peer-to-Peer (e.g. Kazaa) file sharing systems (often trojanned) Peer-to-Peer (e.g. Kazaa) file sharing systems (often trojanned) Added components for browsers Added components for browsers –Services that give credit for surfing sites that require you to install something locally – attachments (usually in SPAM) Not reading the fine print of End User License Agreements (EULA) Not reading the fine print of End User License Agreements (EULA)

What to do about Spyware today Microsoft says to use their Beta*: Microsoft says to use their Beta*: – spywarewhat.mspx spywarewhat.mspxhttp:// spywarewhat.mspx –Available for Windows 2000, XP and Server 2003 Or use one of the leading shareware programs on the market: Or use one of the leading shareware programs on the market: –Lavasoft’s Ad-Aware –Spybot Search & Destroy * Slide corrected since presentation to note the MS tool available for more than just XP

Comparison Tool Long Term DetectCleanBlockUpdateCost Spybot S&D ?GoodMostYesYes?$ AdawareokGoodGoodNoNo?$ MS Anti- Spyware GoodGoodGoodYesYesfree VirusScan Plug-in ?GoodGoodYesYes$$

How to avoid getting Spyware Keep your operating system, browsers, and other applications patched Keep your operating system, browsers, and other applications patched Only install software from trusted sources Only install software from trusted sources –Free isn’t always “FREE” of problems Read EULA before accepting Read EULA before accepting Install and Use Anti-Virus and Spyware blocking software Install and Use Anti-Virus and Spyware blocking software –Anti-Virus: MIT licensed Virus Scan Enterprise 8.0i –Anti-Spyware & Spyware Blocker: Microsoft Anti-Spyware (Beta) Only open attachment that you were expecting Only open attachment that you were expecting

When will it get better? Major Vendors getting involved Major Vendors getting involved –Microsoft release a Beta AntiSpyware re/software/default.mspx re/software/default.mspx re/software/default.mspx re/software/default.mspx –NAI/McAfee released a Beta plugin for VirusScan Enterprise 8.0i