1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
March 2006 Taner Erig - EMU5-1 Basic Information on Spyware and Adware n It is difficult to define spyware and adware with precision. The working definition.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Chapter Nine Maintaining a Computer Part III: Malware.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Spyware Who’s spying on you?. What is Spyware? Spyware is software or hardware installed on a computer without the user's knowledge which gathers information.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Managing Windows Security
3.6 Fundamentals of cyber security
Spyware: Stealthy and Deadly
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Spyware. By: Katheryn L. Gaston.
Spyware: Technical Overview
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel

ECE Internetwork Security 2 Outline Definitions Categories of Spyware Lab material

ECE Internetwork Security 3 Definitions Malware is a malicious software designed specifically to disrupt or harm a computer system Spyware is computer software that gathers and reports information about a computer user without the user's knowledge or consent

ECE Internetwork Security 4 Notorious Spyware Gator One of the most annoying Bargain Buddy Finds you bargains, records your profile Various Internet SearchBars Search Bar that records every move

ECE Internetwork Security 5 How did my computer get infected? Bundled Spyware  Often included in Free/Shareware  Kazaa, iMesh, and etc  Installs more than what it promises  Sometimes mentioned in the agreement form

ECE Internetwork Security 6 How did my computer get infected? Tricky and dishonest Installers

ECE Internetwork Security 7 How did my computer get infected? You can buy them!  Shady companies sell their software with extra *special features –For instance, a Child Monitor program for Internet Browsing that also monitors you.

ECE Internetwork Security 8 Types of Spyware Adware  Annoying Pop-up Ads  Profiles online surfing and spending habits  Tailors Ads based on profile Even when you uninstall the program that installed the Adware, the Adware usually sticks around

ECE Internetwork Security 9 Types of Spyware Snoopware  Sometimes sold as Child monitor  Keeps track of your internet history Keylogger  Records keystrokes to obtain password, credit card numbers, and sensitive information

ECE Internetwork Security 10 Some Simple Solutions Firewall Anti-popup Browser feature Paying closer attention Not downloading shady software and being careful when downloading

ECE Internetwork Security 11 Privacy Software Ad-Aware, Spybot Search and Destroy  Searches RAM, Windows Registry, external storage for known data-mining, tracking, adware, malware  Live update tool which downloads the latest signatures from their web servers

ECE Internetwork Security 12 Lab Material Install a Spyware  Observe the effects –Extra “features” installed –Registry changed –Cookie monitoring internet history  Ad-Aware –Learn the capabilities –Undo the damage

ECE Internetwork Security 13 Lab Material Get your credit card number stolen!

ECE Internetwork Security 14 Lab Material Keylogging Code  Examine a custom keylogger written in C –Try to figure out what the code does  Learn how keylogging is done in Windows –WH_KEYBOARD message Hook

ECE Internetwork Security 15 Future Addition Monitor the behavior of Spyware on network VC6 project files available for Keylogger  Add features for non-evil educational purpose  (i.e. Override User Input, Jumble keys)

ECE Internetwork Security 16 References