Spyware, Adware & Malware
description
Transcript of Spyware, Adware & Malware
Spyware, AdwareSpyware, Adware&&
MalwareMalware
JEEP HOBSONJEEP HOBSONITE-130ITE-130
SPRING 2007SPRING 2007
SPYWARESPYWARE
Is software Is software that collects that collects your personal your personal information information about your about your user habits user habits without your without your consent.consent.
TechniquesTechniques
Logging KeystrokesLogging KeystrokesRecording Internet Web Browsing Recording Internet Web Browsing
HistoryHistoryScanning Documents on the Scanning Documents on the
Computer’s Hard DiskComputer’s Hard Disk
PurposePurpose
Purposes range from overtly Purposes range from overtly criminal ( the theft of passwords criminal ( the theft of passwords and financial details) to the and financial details) to the merely annoying (recording merely annoying (recording Internet search history for Internet search history for targeted advertising, while targeted advertising, while consuming computer resourcesconsuming computer resources
AdwareAdware
Is any software application in Is any software application in which advertising banners are which advertising banners are displayed while the programming displayed while the programming is runningis running
The ads can be viewed through The ads can be viewed through pop-up windows or through a bar pop-up windows or through a bar that appears on a computer that appears on a computer screenscreen
MalwareMalware
Is a type of programming Is a type of programming intended to cause harmintended to cause harm
Malware is designed to send Malware is designed to send itself from your e-mail account to itself from your e-mail account to all the friends and colleagues in all the friends and colleagues in your address book your address book
InfectionInfection
Results of malware infection Results of malware infection include wasted resources, include wasted resources, compromised systems, lack of compromised systems, lack of regulatory compliance, lost or regulatory compliance, lost or stolen data, and the loss if user stolen data, and the loss if user and client confidenceand client confidence
Common Types of MalwareCommon Types of Malware
VirusesVirusesWormsWormsTrojansTrojansSpywareSpywareBrowser Browser
HijackersHijackers
PreventionPrevention
Programs have been developed Programs have been developed in order to detect, quarantine, in order to detect, quarantine, and remove ad-ware as well as and remove ad-ware as well as spy-warespy-ware
Keep up-to-date security patches Keep up-to-date security patches and operating system updates and operating system updates from Windows Updatefrom Windows Update
PreventionPrevention
Use an alternative Use an alternative web browserweb browser
Install ad-blocking Install ad-blocking softwaresoftware