640 likes | 787 Views
Understanding Spyware, Pop Ups, & PC Protection. John Curl Joe Hetherington Bradley Lewis Michael Wu. Spyware. Bradley Lewis. What is Spyware?. A type of malware installed on computers that collects bits of information about users without their knowledge Can be difficult to detect
E N D
Understanding Spyware, Pop Ups, & PC Protection John Curl Joe Hetherington Bradley Lewis Michael Wu
Spyware Bradley Lewis
What is Spyware? A type of malware installed on computers that collects bits of information about users without their knowledge Can be difficult to detect Not only secretly installed on a user’s personal computer, but can also be installed by the owner of a shared, corporate, or public computer to monitor other users
History of Spyware • First recorded use in October of 1995 in a usenet post making fun of Microsoft’s business model • Spyware was thought of as software meant for espionage purposes • Since 2006, spyware is the biggest threat to Microsoft Windows OS, and where IE is used on computers • This is because these are the most widely used
Routes of Infection • Does not usually self-replicate • By design-exploits infected computers for commercial gain. • Routing of HTTP sites to advertisers • Theft of personal information (credit card numbers, SSN, home address, etc.) • Does not usually transmit infection to other computers, but instead gets on a system through exploitation of software vulnerabilities
Routes of Infection(cont) • Does not usually transmit infection to other computers, but instead gets on a system through exploitation of software vulnerabilities • It will deceive the user and piggyback off another program that is wanted, such as Kazaa • Tricks the user into installing what looks like security software but actually isn’t (Trojan method)
Spyware Examples • CoolWebSearch-group of programs that take advantage of IE weaknesses • Internet Optimizer-redirects IE error pages to advertising • HuntBar-aka WinTools; example of how spyware installs more spyware • Movieland-scheme to deceptively extract payments from consumers • MyWebSearch-spys on search habits froma toolbar • Zango- transmits information to advertisers about websites that the user visits • Zlobtrojan-hijacks routers set to default, reports information about search history, websites, and keystrokes to a control server
Effects and Behaviors • Rarely alone- pc usually has multiple infections • Interferes with user control • Creates unwanted • CPU activity • disk usage • network traffic
Effects and Behaviors • Interferes with networking control, making it difficult to connect to the internet • Stability issues include • Applications freezing • Failure to boot • System wide crashes • Many users assume the degradation of their pc is do to hardware issues and windows installation problems
Effects and Behaviors • Can collect various types of personal information • Change computer settings • Results in slow connection speeds • Loss of internet • Loss of program functionality
How to remove Spyware • Back up Data • Disconnect from the internet • Try a traditional uninstall • Scan your computer • Use SmitFraudFix • Get Clear Access to the problem • Undo residual damage • Prevent future adware and spyware
Pop ups John Curl
What is a Pop Up • Form of online advertising to attract traffic to other websites. • Opens up a new browser window • Three types- Pop up, Pop under, Hover ad • Pop up ads are usually generated through JavaScript • Replacement of the banner ad, for marketing purposes • Other versions are useful to user
Pop Up • A browser window that appears over the current window that you are in. • The most common and the most annoying • Like other ads it is usually generated with JavaScript and embedded with HTML • Often has complicated ways of closing the ad
Pop Under Ads • These are very similar to Pop Up Ads, except they appear below or under the current browser window. • Less annoying, some users don’t even realize it is there
Hover Ads • These ads are seem to “hover” over the webpage • More reputable form of advertising • Embedded into website using Flash • Very user friendly, and the least annoying in my opinion • However not as easy to close
Interactive Pop up Ads • These ads attract the user, with some type of mini game that may or may not have anything to do with the product • Users play the game • Then linked to the company website
History of Pop Ups • Pop ups have been around since the mid 90s • They were seen as a much more effective form of internet marketing then the traditional banner ad. • The most popular blocker back then was Pop-up Killer, created by Xavier Flix. • In the early 2000s Opera was the 1st browser to have a pop up blocker built in.
Pop Up Blockers • Opera was the 1st major web browser to incorporate pop up blocker • By 2004 IE was the last major browser to ad pop up blocking • Google Toolbar is widely regarded as the best popup blocker • Now a days most web browsers such as IE, Firefox, Opera, Chrome and Safari have pop up and ad blocking built in.
Pop up Blockers • They can be trained to block unwanted ads, and allow pop ups necessary to the user. • Some pop ups use Flash which can circumnavigate JavaScript based blockers • A recent scientific poll stated that about 81% of users use pop up blockers
PC Protection Michael Wu & Joe Hetherington
Firewalls • Regulates the traffic between computer networks • Network Security Device • Blocks unauthorized access while permitting authorized communications • Configured to permit or deny computer applications based upon criteria
History • Firewall technology started in the late 1980s • Group of engineers from Digital Equipment Corporation (DEC) developed filter systems
First Generation • Packet Filters • Inspects packet • Packet Filter will either accept or reject • Works on the first three layers of the OSI model
Second Generation • Application Layer Filtering • Understands certain applications and protocols • Filters information based on content • Software-Based Firewall • Works on all 7 layers of the OSI model • More secure and reliable than packet filtering
Third Generation • “Stateful” filters • Known as circuit level firewalls • Combines first and second generation • Maintains records of all connections • Determines when a packet starts a new connection, is part of an existing connection, or is an invalid packet.
Personal Firewalls • Application which controls network traffic to and from a computer • Differs from other firewalls in terms of scale • Designed for end-users • Protects only the computer it is installed on • Provides some level of intrusion detection • Allows software to terminate or block connectivity
Personal Firewall • Common Features • Alert the user about outgoing connection attempts • Allows the user to control which programs can and cannot access the local network and/or internet • Hide the computer from port scans by not responding to unsolicited network traffic • Monitor applications that are listening for incoming connections
Personal Firewalls • Monitor and regulate all incoming and outgoing Internet users • Prevent unwanted network traffic from locally installed applications • Provide the user with information about an application that makes a connection attempt • Provide information about the destination server with which an application is attempting to communicate • Sometimes gathers malware and other unwanted programs if you don't scan your computer everyday.
Personal Firewalls • Common Firewall Software • Norton 360 • ZoneAlarm • Lavasoft • Windows Defender
Password Protection • Allows for only users who knows the password to access the computer • Two different methods • Screen Saver Password • User Password
Screen Saver Password • Right Click on the Desktop • Select Properties • Click on Screen Saver tab • Then select the appropriate wait time • And Check the “On resume, password protect” box
Random Passwords User Password
Locks Physical Protection
Software Hardware Keyboard overlays Acoustic KeystrokeLoggers
Software Speech Recognition Web-based keyboards Alternative keyboard layouts One-time passwords Defense
What was the 1st web browser to incorporate pop up blocking? • Safari • Firefox • Opera • Internet Explorer
What was the 1st web browser to incorporate pop up blocking? • Safari • Firefox • Opera • Internet Explorer
How are pop ups generally created? • JavaScript • C++ • Adobe Flash • Ruby
How are pop ups generally created? • JavaScript • C++ • Adobe Flash • Ruby
The first instance of Spyware was recorded in? • 1978 • 1896 • 1995 • 2007
The first instance of Spyware was recorded in? • 1978 • 1896 • 1995 • 2007
Spyware usually self replicates. • True • False