1 / 64

Understanding Spyware, Pop Ups, & PC Protection

Understanding Spyware, Pop Ups, & PC Protection. John Curl Joe Hetherington Bradley Lewis Michael Wu. Spyware. Bradley Lewis. What is Spyware?. A type of malware installed on computers that collects bits of information about users without their knowledge Can be difficult to detect

zavad
Download Presentation

Understanding Spyware, Pop Ups, & PC Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding Spyware, Pop Ups, & PC Protection John Curl Joe Hetherington Bradley Lewis Michael Wu

  2. Spyware Bradley Lewis

  3. What is Spyware? A type of malware installed on computers that collects bits of information about users without their knowledge Can be difficult to detect Not only secretly installed on a user’s personal computer, but can also be installed by the owner of a shared, corporate, or public computer to monitor other users

  4. History of Spyware • First recorded use in October of 1995 in a usenet post making fun of Microsoft’s business model • Spyware was thought of as software meant for espionage purposes • Since 2006, spyware is the biggest threat to Microsoft Windows OS, and where IE is used on computers • This is because these are the most widely used

  5. Routes of Infection • Does not usually self-replicate • By design-exploits infected computers for commercial gain. • Routing of HTTP sites to advertisers • Theft of personal information (credit card numbers, SSN, home address, etc.) • Does not usually transmit infection to other computers, but instead gets on a system through exploitation of software vulnerabilities

  6. Routes of Infection(cont) • Does not usually transmit infection to other computers, but instead gets on a system through exploitation of software vulnerabilities • It will deceive the user and piggyback off another program that is wanted, such as Kazaa • Tricks the user into installing what looks like security software but actually isn’t (Trojan method)

  7. Spyware Examples • CoolWebSearch-group of programs that take advantage of IE weaknesses • Internet Optimizer-redirects IE error pages to advertising • HuntBar-aka WinTools; example of how spyware installs more spyware • Movieland-scheme to deceptively extract payments from consumers • MyWebSearch-spys on search habits froma toolbar • Zango- transmits information to advertisers about websites that the user visits • Zlobtrojan-hijacks routers set to default, reports information about search history, websites, and keystrokes to a control server

  8. Effects and Behaviors • Rarely alone- pc usually has multiple infections • Interferes with user control • Creates unwanted • CPU activity • disk usage • network traffic

  9. Effects and Behaviors • Interferes with networking control, making it difficult to connect to the internet • Stability issues include • Applications freezing • Failure to boot • System wide crashes • Many users assume the degradation of their pc is do to hardware issues and windows installation problems

  10. Effects and Behaviors • Can collect various types of personal information • Change computer settings • Results in slow connection speeds • Loss of internet • Loss of program functionality

  11. How to remove Spyware • Back up Data • Disconnect from the internet • Try a traditional uninstall • Scan your computer • Use SmitFraudFix • Get Clear Access to the problem • Undo residual damage • Prevent future adware and spyware

  12. Pop ups John Curl

  13. What is a Pop Up • Form of online advertising to attract traffic to other websites. • Opens up a new browser window • Three types- Pop up, Pop under, Hover ad • Pop up ads are usually generated through JavaScript • Replacement of the banner ad, for marketing purposes • Other versions are useful to user

  14. Pop Up • A browser window that appears over the current window that you are in. • The most common and the most annoying • Like other ads it is usually generated with JavaScript and embedded with HTML • Often has complicated ways of closing the ad

  15. Pop Under Ads • These are very similar to Pop Up Ads, except they appear below or under the current browser window. • Less annoying, some users don’t even realize it is there

  16. Hover Ads • These ads are seem to “hover” over the webpage • More reputable form of advertising • Embedded into website using Flash • Very user friendly, and the least annoying in my opinion • However not as easy to close

  17. Interactive Pop up Ads • These ads attract the user, with some type of mini game that may or may not have anything to do with the product • Users play the game • Then linked to the company website

  18. History of Pop Ups • Pop ups have been around since the mid 90s • They were seen as a much more effective form of internet marketing then the traditional banner ad. • The most popular blocker back then was Pop-up Killer, created by Xavier Flix. • In the early 2000s Opera was the 1st browser to have a pop up blocker built in.

  19. Pop Up Blockers • Opera was the 1st major web browser to incorporate pop up blocker • By 2004 IE was the last major browser to ad pop up blocking • Google Toolbar is widely regarded as the best popup blocker • Now a days most web browsers such as IE, Firefox, Opera, Chrome and Safari have pop up and ad blocking built in.

  20. Pop up Blockers • They can be trained to block unwanted ads, and allow pop ups necessary to the user. • Some pop ups use Flash which can circumnavigate JavaScript based blockers • A recent scientific poll stated that about 81% of users use pop up blockers

  21. PC Protection Michael Wu & Joe Hetherington

  22. Firewalls • Regulates the traffic between computer networks • Network Security Device • Blocks unauthorized access while permitting authorized communications • Configured to permit or deny computer applications based upon criteria

  23. History • Firewall technology started in the late 1980s • Group of engineers from Digital Equipment Corporation (DEC) developed filter systems

  24. First Generation • Packet Filters • Inspects packet • Packet Filter will either accept or reject • Works on the first three layers of the OSI model

  25. Second Generation • Application Layer Filtering • Understands certain applications and protocols • Filters information based on content • Software-Based Firewall • Works on all 7 layers of the OSI model • More secure and reliable than packet filtering

  26. Third Generation • “Stateful” filters • Known as circuit level firewalls • Combines first and second generation • Maintains records of all connections • Determines when a packet starts a new connection, is part of an existing connection, or is an invalid packet.

  27. Personal Firewalls • Application which controls network traffic to and from a computer • Differs from other firewalls in terms of scale • Designed for end-users • Protects only the computer it is installed on • Provides some level of intrusion detection • Allows software to terminate or block connectivity

  28. Personal Firewall • Common Features • Alert the user about outgoing connection attempts • Allows the user to control which programs can and cannot access the local network and/or internet • Hide the computer from port scans by not responding to unsolicited network traffic • Monitor applications that are listening for incoming connections

  29. Personal Firewalls • Monitor and regulate all incoming and outgoing Internet users • Prevent unwanted network traffic from locally installed applications • Provide the user with information about an application that makes a connection attempt • Provide information about the destination server with which an application is attempting to communicate • Sometimes gathers malware and other unwanted programs if you don't scan your computer everyday.

  30. Personal Firewalls • Common Firewall Software • Norton 360 • ZoneAlarm • Lavasoft • Windows Defender

  31. PASSWORD PROTECTION!

  32. Password Protection • Allows for only users who knows the password to access the computer • Two different methods • Screen Saver Password • User Password

  33. Screen Saver Password • Right Click on the Desktop • Select Properties • Click on Screen Saver tab • Then select the appropriate wait time • And Check the “On resume, password protect” box

  34. Screen Saver Password

  35. Random Passwords User Password

  36. Locks Physical Protection

  37. Software Hardware Keyboard overlays Acoustic KeystrokeLoggers

  38. Software Speech Recognition Web-based keyboards Alternative keyboard layouts One-time passwords Defense

  39. What was the 1st web browser to incorporate pop up blocking? • Safari • Firefox • Opera • Internet Explorer

  40. What was the 1st web browser to incorporate pop up blocking? • Safari • Firefox • Opera • Internet Explorer

  41. How are pop ups generally created? • JavaScript • C++ • Adobe Flash • Ruby

  42. How are pop ups generally created? • JavaScript • C++ • Adobe Flash • Ruby

  43. The first instance of Spyware was recorded in? • 1978 • 1896 • 1995 • 2007

  44. The first instance of Spyware was recorded in? • 1978 • 1896 • 1995 • 2007

  45. Spyware usually self replicates. • True • False

More Related