100 likes | 306 Views
Spyware, Adware & Malware. JEEP HOBSON ITE-130 SPRING 2007. Is software that collects your personal information about your user habits without your consent. SPYWARE. Techniques. Logging Keystrokes Recording Internet Web Browsing History Scanning Documents on the Computer’s Hard Disk.
E N D
Spyware, Adware&Malware • JEEP HOBSON • ITE-130 • SPRING 2007
Is software that collects your personal information about your user habits without your consent. SPYWARE
Techniques • Logging Keystrokes • Recording Internet Web Browsing History • Scanning Documents on the Computer’s Hard Disk
Purpose • Purposes range from overtly criminal ( the theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources
Adware • Is any software application in which advertising banners are displayed while the programming is running • The ads can be viewed through pop-up windows or through a bar that appears on a computer screen
Malware • Is a type of programming intended to cause harm • Malware is designed to send itself from your e-mail account to all the friends and colleagues in your address book
Infection • Results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss if user and client confidence
Viruses Worms Trojans Spyware Browser Hijackers Common Types of Malware
Prevention • Programs have been developed in order to detect, quarantine, and remove ad-ware as well as spy-ware • Keep up-to-date security patches and operating system updates from Windows Update
Use an alternative web browser Install ad-blocking software Prevention