Understanding Spyware, Pop Ups, & PC Protection

64
John Curl Joe Hetherington Bradley Lewis Michael Wu Understanding Spyware, Pop Ups, & PC Protection

description

Understanding Spyware, Pop Ups, & PC Protection. John Curl Joe Hetherington Bradley Lewis Michael Wu. Spyware. Bradley Lewis. What is Spyware?. A type of malware installed on computers that collects bits of information about users without their knowledge Can be difficult to detect - PowerPoint PPT Presentation

Transcript of Understanding Spyware, Pop Ups, & PC Protection

Page 1: Understanding Spyware, Pop Ups, & PC Protection

John CurlJoe Hetherington

Bradley LewisMichael Wu

Understanding Spyware, Pop Ups, & PC Protection

Page 2: Understanding Spyware, Pop Ups, & PC Protection

SpywareBradley Lewis

Page 3: Understanding Spyware, Pop Ups, & PC Protection
Page 4: Understanding Spyware, Pop Ups, & PC Protection

• A type of malware installed on computers that collects bits of information about users without their knowledge•Can be difficult to detect•Not only secretly installed on a user’s personal computer, but can also be installed by the owner of a shared, corporate, or public computer to monitor other users

What is Spyware?

Page 5: Understanding Spyware, Pop Ups, & PC Protection

First recorded use in October of 1995 in a usenet post making fun of Microsoft’s business model

Spyware was thought of as software meant for espionage purposes

Since 2006, spyware is the biggest threat to Microsoft Windows OS, and where IE is used on computersThis is because these are the most widely used

History of Spyware

Page 6: Understanding Spyware, Pop Ups, & PC Protection

Does not usually self-replicateBy design-exploits infected computers for

commercial gain.Routing of HTTP sites to advertisersTheft of personal information (credit card

numbers, SSN, home address, etc.)Does not usually transmit infection to other

computers, but instead gets on a system through exploitation of software vulnerabilities

Routes of Infection

Page 7: Understanding Spyware, Pop Ups, & PC Protection

Does not usually transmit infection to other computers, but instead gets on a system through exploitation of software vulnerabilities

It will deceive the user and piggyback off another program that is wanted, such as Kazaa

Tricks the user into installing what looks like security software but actually isn’t (Trojan method)

Routes of Infection(cont)

Page 8: Understanding Spyware, Pop Ups, & PC Protection
Page 9: Understanding Spyware, Pop Ups, & PC Protection

CoolWebSearch-group of programs that take advantage of IE weaknesses

Internet Optimizer-redirects IE error pages to advertisingHuntBar-aka WinTools; example of how spyware installs

more spywareMovieland-scheme to deceptively extract payments from

consumersMyWebSearch-spys on search habits froma toolbarZango- transmits information to advertisers about websites

that the user visitsZlob trojan-hijacks routers set to default, reports

information about search history, websites, and keystrokes to a control server

Spyware Examples

Page 10: Understanding Spyware, Pop Ups, & PC Protection

Rarely alone- pc usually has multiple infections

Interferes with user controlCreates unwanted

CPU activitydisk usagenetwork traffic

Effects and Behaviors

Page 11: Understanding Spyware, Pop Ups, & PC Protection

Interferes with networking control, making it difficult to connect to the internet

Stability issues includeApplications freezingFailure to bootSystem wide crashes

Many users assume the degradation of their pc is do to hardware issues and windows installation problems

Effects and Behaviors

Page 12: Understanding Spyware, Pop Ups, & PC Protection

Can collect various types of personal information

Change computer settingsResults in slow connection speedsLoss of internetLoss of program functionality

Effects and Behaviors

Page 13: Understanding Spyware, Pop Ups, & PC Protection

Back up DataDisconnect from the internetTry a traditional uninstallScan your computerUse SmitFraudFixGet Clear Access to the problemUndo residual damagePrevent future adware and spyware

How to remove Spyware

Page 14: Understanding Spyware, Pop Ups, & PC Protection
Page 15: Understanding Spyware, Pop Ups, & PC Protection

Pop upsJohn Curl

Page 16: Understanding Spyware, Pop Ups, & PC Protection

Form of online advertising to attract traffic to other websites.

Opens up a new browser windowThree types- Pop up, Pop under, Hover adPop up ads are usually generated through

JavaScriptReplacement of the banner ad, for marketing

purposesOther versions are useful to user

What is a Pop Up

Page 17: Understanding Spyware, Pop Ups, & PC Protection

A browser window that appears over the current window that you are in.

The most common and the most annoyingLike other ads it is usually generated with

JavaScript and embedded with HTMLOften has complicated ways of closing the ad

Pop Up

Page 18: Understanding Spyware, Pop Ups, & PC Protection
Page 19: Understanding Spyware, Pop Ups, & PC Protection

These are very similar to Pop Up Ads, except they appear below or under the current browser window.

Less annoying, some users don’t even realize it is there

Pop Under Ads

Page 20: Understanding Spyware, Pop Ups, & PC Protection

These ads are seem to “hover” over the webpage

More reputable form of advertisingEmbedded into website using FlashVery user friendly, and the least annoying in

my opinionHowever not as easy to close

Hover Ads

Page 21: Understanding Spyware, Pop Ups, & PC Protection
Page 22: Understanding Spyware, Pop Ups, & PC Protection

These ads attract the user, with some type of mini game that may or may not have anything to do with the product

Users play the gameThen linked to the company website

Interactive Pop up Ads

Page 23: Understanding Spyware, Pop Ups, & PC Protection

Pop ups have been around since the mid 90sThey were seen as a much more effective

form of internet marketing then the traditional banner ad.

The most popular blocker back then was Pop-up Killer, created by Xavier Flix.

In the early 2000s Opera was the 1st browser to have a pop up blocker built in.

History of Pop Ups

Page 24: Understanding Spyware, Pop Ups, & PC Protection

Opera was the 1st major web browser to incorporate pop up blocker

By 2004 IE was the last major browser to ad pop up blocking

Google Toolbar is widely regarded as the best popup blocker

Now a days most web browsers such as IE, Firefox, Opera, Chrome and Safari have pop up and ad blocking built in.

Pop Up Blockers

Page 25: Understanding Spyware, Pop Ups, & PC Protection

They can be trained to block unwanted ads, and allow pop ups necessary to the user.

Some pop ups use Flash which can circumnavigate JavaScript based blockers

A recent scientific poll stated that about 81% of users use pop up blockers

Pop up Blockers

Page 26: Understanding Spyware, Pop Ups, & PC Protection

PC ProtectionMichael Wu & Joe Hetherington

Page 27: Understanding Spyware, Pop Ups, & PC Protection

Firewalls• Regulates the traffic between

computer networks• Network Security Device

– Blocks unauthorized access while permitting authorized communications

– Configured to permit or deny computer applications based upon criteria

Page 28: Understanding Spyware, Pop Ups, & PC Protection

History• Firewall technology started in the

late 1980s• Group of engineers from Digital

Equipment Corporation (DEC) developed filter systems

Page 29: Understanding Spyware, Pop Ups, & PC Protection

First Generation• Packet Filters

– Inspects packet– Packet Filter will either accept or reject

• Works on the first three layers of the OSI model

Page 30: Understanding Spyware, Pop Ups, & PC Protection

Second Generation• Application Layer Filtering

– Understands certain applications and protocols

– Filters information based on content– Software-Based Firewall

• Works on all 7 layers of the OSI model

– More secure and reliable than packet filtering

Page 31: Understanding Spyware, Pop Ups, & PC Protection

Third Generation• “Stateful” filters

– Known as circuit level firewalls– Combines first and second generation– Maintains records of all connections

• Determines when a packet starts a new connection, is part of an existing connection, or is an invalid packet.

Page 32: Understanding Spyware, Pop Ups, & PC Protection

Personal Firewalls• Application which controls network

traffic to and from a computer• Differs from other firewalls in terms

of scale– Designed for end-users – Protects only the computer it is installed

on• Provides some level of intrusion

detection– Allows software to terminate or block

connectivity

Page 33: Understanding Spyware, Pop Ups, & PC Protection

Personal Firewall• Common Features

– Alert the user about outgoing connection attempts

– Allows the user to control which programs can and cannot access the local network and/or internet

– Hide the computer from port scans by not responding to unsolicited network traffic

– Monitor applications that are listening for incoming connections

Page 34: Understanding Spyware, Pop Ups, & PC Protection

– Monitor and regulate all incoming and outgoing Internet users

– Prevent unwanted network traffic from locally installed applications

– Provide the user with information about an application that makes a connection attempt

– Provide information about the destination server with which an application is attempting to communicate

– Sometimes gathers malware and other unwanted programs if you don't scan your computer everyday.

Personal Firewalls

Page 35: Understanding Spyware, Pop Ups, & PC Protection

Personal Firewalls• Common Firewall Software

– Norton 360– ZoneAlarm– Lavasoft– Windows Defender

Page 36: Understanding Spyware, Pop Ups, & PC Protection

PASSWORD PROTECTION!

Page 37: Understanding Spyware, Pop Ups, & PC Protection

Password Protection• Allows for only users who knows the

password to access the computer• Two different methods

– Screen Saver Password– User Password

Page 38: Understanding Spyware, Pop Ups, & PC Protection

Screen Saver Password• Right Click on the Desktop• Select Properties• Click on Screen Saver tab• Then select the appropriate wait

time• And Check the “On resume,

password protect” box

Page 39: Understanding Spyware, Pop Ups, & PC Protection

Screen Saver Password

Page 40: Understanding Spyware, Pop Ups, & PC Protection

User Password

Random Passwords

Page 41: Understanding Spyware, Pop Ups, & PC Protection

Physical ProtectionLocks

Page 42: Understanding Spyware, Pop Ups, & PC Protection

Keystroke LoggersSoftwareHardwareKeyboard overlaysAcoustic

Page 43: Understanding Spyware, Pop Ups, & PC Protection

Defense

SoftwareSpeech RecognitionWeb-based keyboardsAlternative keyboard layoutsOne-time passwords

Page 44: Understanding Spyware, Pop Ups, & PC Protection

1. What was the 1st web browser to incorporate pop up blocking?

a) Safarib) Firefoxc) Operad) Internet Explorer

Page 45: Understanding Spyware, Pop Ups, & PC Protection

1. What was the 1st web browser to incorporate pop up blocking?

a) Safarib) Firefox

c)Operad) Internet Explorer

Page 46: Understanding Spyware, Pop Ups, & PC Protection

2. How are pop ups generally created?a) JavaScriptb) C++c) Adobe Flashd) Ruby

Page 47: Understanding Spyware, Pop Ups, & PC Protection

2. How are pop ups generally created?a)JavaScriptb) C++c) Adobe Flashd) Ruby

Page 48: Understanding Spyware, Pop Ups, & PC Protection

3. The first instance of Spyware was recorded in?

a) 1978b) 1896c) 1995d) 2007

Page 49: Understanding Spyware, Pop Ups, & PC Protection

3. The first instance of Spyware was recorded in?

a) 1978b) 1896

c)1995d) 2007

Page 50: Understanding Spyware, Pop Ups, & PC Protection

4. Spyware usually self replicates.a) Trueb) False

Page 51: Understanding Spyware, Pop Ups, & PC Protection

4. Spyware usually self replicates.a) True

b)False

Page 52: Understanding Spyware, Pop Ups, & PC Protection

5. Spyware is a type of malware installed on computers that collects bits of information about users without their knowledge.

a) Trueb) False

Page 53: Understanding Spyware, Pop Ups, & PC Protection

5. Spyware is a type of malware installed on computers that collects bits of information about users without their knowledge.

a)Trueb) False

Page 54: Understanding Spyware, Pop Ups, & PC Protection

6. Stability issues includea) Applications freezingb) Failure to bootc) System wide crashesd) All of the above

Page 55: Understanding Spyware, Pop Ups, & PC Protection

6. Stability issues includea) Applications freezingb) Failure to bootc) System wide crashes

d) All of the above

Page 56: Understanding Spyware, Pop Ups, & PC Protection

7. What group first developed firewalls?a) DEC(Digital Equipment Corporation)b) IBMc) Microsoft

Page 57: Understanding Spyware, Pop Ups, & PC Protection

7. What group first developed firewalls?a)DEC(Digital Equipment

Corporation)b) IBMc) Microsoft

Page 58: Understanding Spyware, Pop Ups, & PC Protection

8. According to a recent scientific study what percentage of users use pop up blockers?

a) 99%b) 81%c) 10%d) 50%

Page 59: Understanding Spyware, Pop Ups, & PC Protection

8. According to a recent scientific study what percentage of users use pop up blockers?

a) 99%

b)81%c) 10%d) 50%

Page 60: Understanding Spyware, Pop Ups, & PC Protection

9. What are some ways to physically protect your PC?

a) Passwordsb) Security Cablesc) Keystroke Loggersd) All of the Above

Page 61: Understanding Spyware, Pop Ups, & PC Protection

9. What are some ways to physically protect your PC?

a) Passwordsb) Security Cablesc) Keystroke Loggers

d)All of the Above

Page 62: Understanding Spyware, Pop Ups, & PC Protection

10.Pop ups are a form of internet advertising that supersedes banner ads.

a) True b) False

Page 63: Understanding Spyware, Pop Ups, & PC Protection

10.Pop ups are a form of internet advertising that supersedes banner ads.

a)True b) False

Page 64: Understanding Spyware, Pop Ups, & PC Protection

http://en.wikipedia.org/wiki/Pop-up_adhttp://www.youtube.com/watch?

v=ZgsYXeUJYXchttp://antivirus.about.com/od/

spywareandadware/tp/adwarespyware.htmhttp://en.wikipedia.org/wiki/Spywarehttps://www.grc.com/passwords.htm http://store.apple.com/us/product/TW041LL/

A?fnode=MTY1NDA2OA&mco=MTA4NDI3Nzg

Works Cited