Download presentation
Presentation is loading. Please wait.
Published byJason Patterson Modified over 8 years ago
1
SPYWARE Presented by: Deb Neese, City of Phoenix January 20, 2005
2
TOPICS FOR DISCUSSION What is Spyware Spyware management Anti-Spyware market maturity City of Phoenix approach to managing Spyware
3
What is Spyware? Any software communicating across the Internet that makes silent background use of an Internet “backchannel” connection without the prior complete and truthful disclosure of proposed backchannel usage, followed by the receipt of explicit, informed, consent for such is SPYWARE.
4
Types of Spyware Browser HijackAdware TrojansProfiling Cookies Web BugsDialers Keyboard LoggersDroneware and Trackware
5
Where Does Spyware Come From? Spyware is often embedded within: Popular so-called freeware/adware programs Action Type Elements within Web Pages
6
Spyware Delivery Methods Drive-by Download—while user’s surf the net, they are lured to download programs by claims pretending to be legitimate that will enhance the browsing experience, or SPAM mail which include Internet Links
7
In most cases, Spyware is inadvertently or silently installed
8
Most Common Symptoms of Spyware Installed on a PC PC is running “slow” User is experiencing a large number of Pop-Up Ads
9
Spyware Management Industry standard recommendation for managing Spyware is to follow the same approach used to manage virus protection. Redundancy
10
Spyware Management (con’t) Use a combination of products: Endpoint, perimeter software that proactively prevents Spyware from being installed Desktop level software to scan for existence of then to remove
11
Anti-Spyware Market Maturity Market has not fully matured Very few enterprise class products available for prevention 100+ desktop products—many of them touted as untrustworthy or questionable
12
Marketing Trend Analysis Most analysts, anti-spyware vendors, and antivirus companies have said they expect antivirus and anti-spyware to merge, since customers ultimately want an all-in-one way to nuke everything from viruses and worms to spam and spyware.
13
Anti-Spyware Legislation Bill Numbers 2929 and 4661 Will join the Can Spam Act Have passed the House Judiciary Committee and are expected to pass the Senate in the 109 th Congress
14
Microsoft Anti-Spyware Product MicrosoftAcquiredDecember 2004 Giant Anti-Spyware Company Microsoft ReleasedJanuary 2005 Beta “Potentially Unwanted Software” Anti-Spyware Product
15
City of Phoenix Spyware Management Endpoint Prevention Desktop Anti-Spyware software upon demand Scheduled upgrades in other desktop products will assist by providing scanning and removal features
16
Inbound Internet November 2004 Email SPAM/Spyware Scanning Prevention Software Implemented Outbound Internet January 2005 Access Filtering Service Scheduled to be Implemented Endpoint Prevention
17
City staff estimate that a very large % of all Spyware may be prevented following implementation of both of these products/services. Endpoint Prevention (con’t)
18
Desktop Spyware Management (con’t) Desktop level scanning and removal Anti- Spyware product used upon demand-- when it is suspected that a PC is infected
19
Scheduled Software Upgrades that will also assist in Spyware Management Windows XP ServiceJanuary 2005 Pack 2 certified for use Symantec Version 9 Spring 2005
20
Questions/Comments
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.