Understanding Spyware, Pop Ups, & PC Protection
description
Transcript of Understanding Spyware, Pop Ups, & PC Protection
John CurlJoe Hetherington
Bradley LewisMichael Wu
Understanding Spyware, Pop Ups, & PC Protection
SpywareBradley Lewis
• A type of malware installed on computers that collects bits of information about users without their knowledge•Can be difficult to detect•Not only secretly installed on a user’s personal computer, but can also be installed by the owner of a shared, corporate, or public computer to monitor other users
What is Spyware?
First recorded use in October of 1995 in a usenet post making fun of Microsoft’s business model
Spyware was thought of as software meant for espionage purposes
Since 2006, spyware is the biggest threat to Microsoft Windows OS, and where IE is used on computersThis is because these are the most widely used
History of Spyware
Does not usually self-replicateBy design-exploits infected computers for
commercial gain.Routing of HTTP sites to advertisersTheft of personal information (credit card
numbers, SSN, home address, etc.)Does not usually transmit infection to other
computers, but instead gets on a system through exploitation of software vulnerabilities
Routes of Infection
Does not usually transmit infection to other computers, but instead gets on a system through exploitation of software vulnerabilities
It will deceive the user and piggyback off another program that is wanted, such as Kazaa
Tricks the user into installing what looks like security software but actually isn’t (Trojan method)
Routes of Infection(cont)
CoolWebSearch-group of programs that take advantage of IE weaknesses
Internet Optimizer-redirects IE error pages to advertisingHuntBar-aka WinTools; example of how spyware installs
more spywareMovieland-scheme to deceptively extract payments from
consumersMyWebSearch-spys on search habits froma toolbarZango- transmits information to advertisers about websites
that the user visitsZlob trojan-hijacks routers set to default, reports
information about search history, websites, and keystrokes to a control server
Spyware Examples
Rarely alone- pc usually has multiple infections
Interferes with user controlCreates unwanted
CPU activitydisk usagenetwork traffic
Effects and Behaviors
Interferes with networking control, making it difficult to connect to the internet
Stability issues includeApplications freezingFailure to bootSystem wide crashes
Many users assume the degradation of their pc is do to hardware issues and windows installation problems
Effects and Behaviors
Can collect various types of personal information
Change computer settingsResults in slow connection speedsLoss of internetLoss of program functionality
Effects and Behaviors
Back up DataDisconnect from the internetTry a traditional uninstallScan your computerUse SmitFraudFixGet Clear Access to the problemUndo residual damagePrevent future adware and spyware
How to remove Spyware
Pop upsJohn Curl
Form of online advertising to attract traffic to other websites.
Opens up a new browser windowThree types- Pop up, Pop under, Hover adPop up ads are usually generated through
JavaScriptReplacement of the banner ad, for marketing
purposesOther versions are useful to user
What is a Pop Up
A browser window that appears over the current window that you are in.
The most common and the most annoyingLike other ads it is usually generated with
JavaScript and embedded with HTMLOften has complicated ways of closing the ad
Pop Up
These are very similar to Pop Up Ads, except they appear below or under the current browser window.
Less annoying, some users don’t even realize it is there
Pop Under Ads
These ads are seem to “hover” over the webpage
More reputable form of advertisingEmbedded into website using FlashVery user friendly, and the least annoying in
my opinionHowever not as easy to close
Hover Ads
These ads attract the user, with some type of mini game that may or may not have anything to do with the product
Users play the gameThen linked to the company website
Interactive Pop up Ads
Pop ups have been around since the mid 90sThey were seen as a much more effective
form of internet marketing then the traditional banner ad.
The most popular blocker back then was Pop-up Killer, created by Xavier Flix.
In the early 2000s Opera was the 1st browser to have a pop up blocker built in.
History of Pop Ups
Opera was the 1st major web browser to incorporate pop up blocker
By 2004 IE was the last major browser to ad pop up blocking
Google Toolbar is widely regarded as the best popup blocker
Now a days most web browsers such as IE, Firefox, Opera, Chrome and Safari have pop up and ad blocking built in.
Pop Up Blockers
They can be trained to block unwanted ads, and allow pop ups necessary to the user.
Some pop ups use Flash which can circumnavigate JavaScript based blockers
A recent scientific poll stated that about 81% of users use pop up blockers
Pop up Blockers
PC ProtectionMichael Wu & Joe Hetherington
Firewalls• Regulates the traffic between
computer networks• Network Security Device
– Blocks unauthorized access while permitting authorized communications
– Configured to permit or deny computer applications based upon criteria
History• Firewall technology started in the
late 1980s• Group of engineers from Digital
Equipment Corporation (DEC) developed filter systems
First Generation• Packet Filters
– Inspects packet– Packet Filter will either accept or reject
• Works on the first three layers of the OSI model
Second Generation• Application Layer Filtering
– Understands certain applications and protocols
– Filters information based on content– Software-Based Firewall
• Works on all 7 layers of the OSI model
– More secure and reliable than packet filtering
Third Generation• “Stateful” filters
– Known as circuit level firewalls– Combines first and second generation– Maintains records of all connections
• Determines when a packet starts a new connection, is part of an existing connection, or is an invalid packet.
Personal Firewalls• Application which controls network
traffic to and from a computer• Differs from other firewalls in terms
of scale– Designed for end-users – Protects only the computer it is installed
on• Provides some level of intrusion
detection– Allows software to terminate or block
connectivity
Personal Firewall• Common Features
– Alert the user about outgoing connection attempts
– Allows the user to control which programs can and cannot access the local network and/or internet
– Hide the computer from port scans by not responding to unsolicited network traffic
– Monitor applications that are listening for incoming connections
– Monitor and regulate all incoming and outgoing Internet users
– Prevent unwanted network traffic from locally installed applications
– Provide the user with information about an application that makes a connection attempt
– Provide information about the destination server with which an application is attempting to communicate
– Sometimes gathers malware and other unwanted programs if you don't scan your computer everyday.
Personal Firewalls
Personal Firewalls• Common Firewall Software
– Norton 360– ZoneAlarm– Lavasoft– Windows Defender
PASSWORD PROTECTION!
Password Protection• Allows for only users who knows the
password to access the computer• Two different methods
– Screen Saver Password– User Password
Screen Saver Password• Right Click on the Desktop• Select Properties• Click on Screen Saver tab• Then select the appropriate wait
time• And Check the “On resume,
password protect” box
Screen Saver Password
Physical ProtectionLocks
Keystroke LoggersSoftwareHardwareKeyboard overlaysAcoustic
Defense
SoftwareSpeech RecognitionWeb-based keyboardsAlternative keyboard layoutsOne-time passwords
1. What was the 1st web browser to incorporate pop up blocking?
a) Safarib) Firefoxc) Operad) Internet Explorer
1. What was the 1st web browser to incorporate pop up blocking?
a) Safarib) Firefox
c)Operad) Internet Explorer
2. How are pop ups generally created?a) JavaScriptb) C++c) Adobe Flashd) Ruby
2. How are pop ups generally created?a)JavaScriptb) C++c) Adobe Flashd) Ruby
3. The first instance of Spyware was recorded in?
a) 1978b) 1896c) 1995d) 2007
3. The first instance of Spyware was recorded in?
a) 1978b) 1896
c)1995d) 2007
4. Spyware usually self replicates.a) Trueb) False
4. Spyware usually self replicates.a) True
b)False
5. Spyware is a type of malware installed on computers that collects bits of information about users without their knowledge.
a) Trueb) False
5. Spyware is a type of malware installed on computers that collects bits of information about users without their knowledge.
a)Trueb) False
6. Stability issues includea) Applications freezingb) Failure to bootc) System wide crashesd) All of the above
6. Stability issues includea) Applications freezingb) Failure to bootc) System wide crashes
d) All of the above
7. What group first developed firewalls?a) DEC(Digital Equipment Corporation)b) IBMc) Microsoft
7. What group first developed firewalls?a)DEC(Digital Equipment
Corporation)b) IBMc) Microsoft
8. According to a recent scientific study what percentage of users use pop up blockers?
a) 99%b) 81%c) 10%d) 50%
8. According to a recent scientific study what percentage of users use pop up blockers?
a) 99%
b)81%c) 10%d) 50%
9. What are some ways to physically protect your PC?
a) Passwordsb) Security Cablesc) Keystroke Loggersd) All of the Above
9. What are some ways to physically protect your PC?
a) Passwordsb) Security Cablesc) Keystroke Loggers
d)All of the Above
10.Pop ups are a form of internet advertising that supersedes banner ads.
a) True b) False
10.Pop ups are a form of internet advertising that supersedes banner ads.
a)True b) False
http://en.wikipedia.org/wiki/Pop-up_adhttp://www.youtube.com/watch?
v=ZgsYXeUJYXchttp://antivirus.about.com/od/
spywareandadware/tp/adwarespyware.htmhttp://en.wikipedia.org/wiki/Spywarehttps://www.grc.com/passwords.htm http://store.apple.com/us/product/TW041LL/
A?fnode=MTY1NDA2OA&mco=MTA4NDI3Nzg
Works Cited