1 / 34

Adware and Spyware

Adware and Spyware. Define terms, scope, and motivation Discuss impact (personal and business) Review basic technical aspects Provide basic identification and removal resources Discuss prevention techniques. Objectives. Definitions, Scope, and Motivation. Malware: mal icious soft ware

brina
Télécharger la présentation

Adware and Spyware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Adware and Spyware

  2. Define terms, scope, and motivation • Discuss impact (personal and business) • Review basic technical aspects • Provide basic identification and removal resources • Discuss prevention techniques Objectives

  3. Definitions, Scope, and Motivation

  4. Malware: malicious software • Adware: advertising-oriented • Spyware: information-oriented • Anti-adware and anti-spyware are the tools that fight them Definitions

  5. What and Why? Adware Spyware Spying Goal is to gather information Data pulled from you to them Hopefully information can be used for sale or power • Advertising • Goal is to sell or promote • Data pushed from them to you • Hopefully you will buy or visit

  6. Money • Firms place ads for selves or clients • Paid by click-through or direct purchase • Identity/data theft • Power • Ruin rival’s reputation • Blackmail, intelligence activities • Gain notoriety and satisfaction Motivation

  7. Trojans, viruses, phishing, pharming, rootkits, adware, spyware … so much bad stuff! • Questions: • Can adware be spyware? • Is there a relationship between adware, spyware, and other malware? Relationships

  8. Impact and Effects

  9. Loss of computer functionality Impact and Effects

  10. What Is This? Source: http://en.wikipedia.org/wiki/Image:Spyware_infestation.png

  11. Internet Explorer On XP The web page! Entire screen Source: http://en.wikipedia.org/wiki/Image:Spyware_infestation.png

  12. Loss of computer functionality • Loss of computer performance • Loss of personally identifiable information Impact and Effects

  13. Maricopa County • Continues to grow in frequency • Effects: • Loss of money • Credit problems • Criminal record • Inability to work Impact: Identity Theft

  14. Technical Aspects (How It Works)

  15. Pop-ups • Conditional acceptance • Tracking cookies (history) • Tracking images (web, email) Some Adware Techniques

  16. Click tracking • Active web technology • Careless use of protective software (or none at all!) Some Adware Techniques

  17. Software downloads • Online games • Keystroke loggers • Pop-ups Some Spyware Techniques

  18. Free adware/spyware removal programs • Commercial software • Careless use of protective software (or none at all!) Some Spyware Techniques

  19. Identifying and Removing

  20. Adware is everywhere Identifying and Removing www.zedo.com “Zwinky is free with download of toolbar” http://www.youtube.com/v/1jbEZlnl9WQ

  21. 67% infected among those surveyed* • Can you keep up? Identifying and Removing * Source: Enterprise Information Systems Assurance and System Security (Warkentin and Vaughn, ed.), p. 51.

  22. Common symptoms* • Pop-ups • Toolbars • Performance problems • More OS/application crashes • Can be symptomless Identifying and Removing * Source: Enterprise Information Systems Assurance and System Security (Warkentin and Vaughn, ed.), p. 51.

  23. Anti-adware tools • Anti-spyware tools • Network packet sniffing Identifying and Removing

  24. Methods: • Manual • “Free” tools • Commercial tools • Can be difficult Removal

  25. Prevention

  26. What does not prevent it?* • Personal firewalls • Anti-virus programs • The best you can hope for is to discourage it. Prevention * But they do help prevent spyware and adware that spread that way.

  27. Safe browsing: • Disable active browser technologies • Limit use of cookies • Limit browsing to reputable sites • Use “high” security settings • Flush cached and personal information Prevention

  28. Anti-spyware and anti-adware • No single product or suite handles it all • Investigate tools carefully • Firewall and anti-virus • Up to date • Properly configured • Stay informed! Prevention

  29. Business Aspects

  30. Loss of productivity • Increased IT support costs • Theft of intellectual property • Liability associated with privacy violations • Premature information disclosure • Loss of credibility … Business Impact Source: Enterprise Information Systems Assurance and System Security (Warkentin and Vaughn, ed.), p. 52.

  31. Security policy • Write it down • Educate everyone • Management buy-in • Audit compliance • Use generally good practices • Stay up to date! Business Prevention

  32. Adware and spyware come with serious consequences • Identification and removal can be difficult • Prevention is best • User education is key Conclusions

  33. Questions?

  34. Enterprise Information Systems Assurance and System Security, Warkentin and Vaughn, ed., 2006. • Wikipedia, http://www.wikipedia.org • Original clip art is from the Microsoft Office web site unless otherwise cited Credits

More Related