Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
3.04 Malicious Software Can Travel and Spread Unit 3 Internet Basics.
Computer Viruses.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Return to the PC Security web page Lesson 5: Dealing with Malware.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Managing Windows Security
Three steps to prevent Malware infection
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Introduction-Cyber Safety
Presentation transcript:

Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007

SPYWARE Is software that collects your personal information about your user habits without your consent. Is software that collects your personal information about your user habits without your consent.

Techniques Logging Keystrokes Logging Keystrokes Recording Internet Web Browsing History Recording Internet Web Browsing History Scanning Documents on the Computer’s Hard Disk Scanning Documents on the Computer’s Hard Disk

Purpose Purposes range from overtly criminal ( the theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources Purposes range from overtly criminal ( the theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources

Adware Is any software application in which advertising banners are displayed while the programming is running Is any software application in which advertising banners are displayed while the programming is running The ads can be viewed through pop-up windows or through a bar that appears on a computer screen The ads can be viewed through pop-up windows or through a bar that appears on a computer screen

Malware Is a type of programming intended to cause harm Is a type of programming intended to cause harm Malware is designed to send itself from your account to all the friends and colleagues in your address book Malware is designed to send itself from your account to all the friends and colleagues in your address book

Infection Results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss if user and client confidence Results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss if user and client confidence

Common Types of Malware Viruses Viruses Worms Worms Trojans Trojans Spyware Spyware Browser Hijackers Browser Hijackers

Prevention Programs have been developed in order to detect, quarantine, and remove ad- ware as well as spy-ware Programs have been developed in order to detect, quarantine, and remove ad- ware as well as spy-ware Keep up-to-date security patches and operating system updates from Windows Update Keep up-to-date security patches and operating system updates from Windows Update

Prevention Use an alternative web browser Use an alternative web browser Install ad-blocking software Install ad-blocking software