1 / 10

Spyware, Adware & Malware

Spyware, Adware & Malware. JEEP HOBSON ITE-130 SPRING 2007. Is software that collects your personal information about your user habits without your consent. SPYWARE. Techniques. Logging Keystrokes Recording Internet Web Browsing History Scanning Documents on the Computer’s Hard Disk.

moya
Télécharger la présentation

Spyware, Adware & Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spyware, Adware&Malware • JEEP HOBSON • ITE-130 • SPRING 2007

  2. Is software that collects your personal information about your user habits without your consent. SPYWARE

  3. Techniques • Logging Keystrokes • Recording Internet Web Browsing History • Scanning Documents on the Computer’s Hard Disk

  4. Purpose • Purposes range from overtly criminal ( the theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources

  5. Adware • Is any software application in which advertising banners are displayed while the programming is running • The ads can be viewed through pop-up windows or through a bar that appears on a computer screen

  6. Malware • Is a type of programming intended to cause harm • Malware is designed to send itself from your e-mail account to all the friends and colleagues in your address book

  7. Infection • Results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss if user and client confidence

  8. Viruses Worms Trojans Spyware Browser Hijackers Common Types of Malware

  9. Prevention • Programs have been developed in order to detect, quarantine, and remove ad-ware as well as spy-ware • Keep up-to-date security patches and operating system updates from Windows Update

  10. Use an alternative web browser Install ad-blocking software Prevention

More Related