SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
SPYWARE
By liza ormol
OBJECTIVES
 What is spyware
 Who is spying
 How spyware operates
 Impact of spyware
 Risk of future security incidents
 Common spyware forms
2
WHAT IS SPYWARE
 Spyware is one type of malicious software
(malware) that collects information from a
computing system without content
 Spyware can capture keystrokes , screenshots ,
web from data , internet usage habits and other
personal information
 The data often delivered to online attackers who
sell it to others or sell it themselves
3
WHO IS SPYING
 The people who use spyware include :
 Online attackers
 Marketing organization
 Trusted insiders
4
ONLINE ATTACKERS
 Online attackers’ primary interest in spyware is
using it to steal personal information for financial
crimes
 Such as carding (illicit trafficking in stolen credit
card and credit card information) and identity theft
 Or to sell that information to someone else who
then executes more traditional crimes
5
MARKETING ORGANIZATION
 Marketing organization are interested in personal
information such as email address , online
shopping and browsing habits
 That can be used to execute marketing campaigns
like spam , browsers popups , homepage
hijacking(changing the default web address for a
users browser)
6
TRUSTED INSIDERS
 Trusted insiders include those who have physical
access to computer system for legitimate purposes
 Some examples are employs , contractors ,
temporary workers , and cleaning crews
 For example an employee who uses spyware to
collect corporate information that can be sold in
underground economy used , for blackmail
7
HOW SPYWARE OPERATES
 Spyware tracks online activity looking for websites
visited
 Financial data or identity data such as credit card
numbers on screen or entered into form field
 When keywords of internet like names of banks ,
online payment system are observed , the spyware
starts its data collection process
8
IMPACT OF SPYWARE
 Spyware can cause people to loss trust in the
reliability of online business transactions
 Similar to the problem of counterfeit currency in the
physical world , spyware undermines confidence in
online economic activity
 Consumer willingness to participate in online
monetary transactions decrease for fear of personal
financial loss
9
CONTINUE
 Even when financial organizations cover an
individual’s loss from online fraud
 these costs plus the overhead required to
administer loss prevention programs are eventually
passed back to customers in the form of high
service fees , interest rates
 As a result , growth rates in commerce are slowed ,
cost increase , and demand shrinks
10
RISK OF FUTURE SECURITY INCIDENTS
 These sensitive information collected by spyware
often includes authentication credentials that may
be used for future access to the infected system
 Once access is gained , additional information theft
or malware installation take place
 Another way spyware puts system at future risk is
by installing backdoor access mechanisms
11
COMMON SPYWARE FORMS
 Browser session hijacking
 Browser helper objects
 Cookies and web bags
 False antispyware tools
 Autonomous spyware
 Bots
12
BROWSER SESSION HIJACKING
 This class of spyware attempts to modify the users
browsers setting
 Hijacking spyware can be installed in various ways
 These redirects lead users to advertisements that
earn the hijacking commissions when they are
visited
13
BROWSER HELPER OBJECTS
 Browser helper object (BHOs) are a feature of
internet explorer that can be exploited by spyware
and they are not always easy to detect
 BHOs can access files , network recourses , and
anything else the user who launched internet
explorer can access
 Another social engineering technique is inundating
the user with repeated popup request to install the
software
14
COOKIES AND WEB BUGS
Cookies are small pieces of information stored on a
user’s system by a web server. During subsequent
visits
often , cookies are used for storing user
authentication , preferences , and other type of user
information
They can be used to track a user across multiple
websites
15
FALSE ANTISPYWARE TOOLS
 Applications available on some internet sites
advertise themselves
 as spyware detection or removable tools
 In fact they themselves are spyware
16
AUTONOMOUS SPYWARE
 Autonomous spyware operates as a separate
process or injects itself into other processes
running on your system
 This type of spyware often starts up when you log
onto your computer and can frequently access
anything on your system
 Autonomous spyware is malicious application , it
can be designed to perform any type of spying
functions
17
BOTS
 A special class of malware known as a bot or
zombie is one of largest malware problems
 Bots are remote control agents installed on your
system
 Once a system is infected with a bot , it become
part of a the bot network ( botnet) and is used in
conjunction of other botnet members
18
REFERENCE
 Spywarehome_0905.pdf
19
20

Mais conteúdo relacionado

Mais procurados

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniquesJhumarieAcdan
 

Mais procurados (20)

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Spyware
SpywareSpyware
Spyware
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Malware and security
Malware and securityMalware and security
Malware and security
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 

Destaque

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alamsahibe alam
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3bfovi96
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yofovi96
 
Mobile generation technology
Mobile generation technologyMobile generation technology
Mobile generation technologyVishal Rajput
 
Wild communications
Wild communicationsWild communications
Wild communicationsWC
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)WCN Transmedia Group
 

Destaque (19)

spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Mobile generation technology
Mobile generation technologyMobile generation technology
Mobile generation technology
 
Wild communications
Wild communicationsWild communications
Wild communications
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Spyware
SpywareSpyware
Spyware
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
 

Semelhante a Spyware

Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
ESC Information Booklet EN
ESC Information Booklet ENESC Information Booklet EN
ESC Information Booklet ENPavel26766
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxChaitanyaMundra2
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptxChloeLucas4
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 

Semelhante a Spyware (20)

Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Safety from Spyware
Safety from SpywareSafety from Spyware
Safety from Spyware
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
ESC Information Booklet EN
ESC Information Booklet ENESC Information Booklet EN
ESC Information Booklet EN
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Information security
Information securityInformation security
Information security
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 

Mais de Kardan university, kabul , Afghanistan (11)

Interview skills
Interview skillsInterview skills
Interview skills
 
Investors’ views’ of investment in afghanistan
Investors’ views’ of investment in afghanistanInvestors’ views’ of investment in afghanistan
Investors’ views’ of investment in afghanistan
 
Effects of stress on human health
Effects of stress on human healthEffects of stress on human health
Effects of stress on human health
 
Three permanent members of europe(germany , france ,
Three permanent members of europe(germany , france ,Three permanent members of europe(germany , france ,
Three permanent members of europe(germany , france ,
 
Death penality
Death penalityDeath penality
Death penality
 
Causes of 2009 financial crisis in us
Causes of 2009 financial crisis in usCauses of 2009 financial crisis in us
Causes of 2009 financial crisis in us
 
Afghanistan economy
Afghanistan economyAfghanistan economy
Afghanistan economy
 
Walmart
WalmartWalmart
Walmart
 
Bayaaz dairy
Bayaaz dairyBayaaz dairy
Bayaaz dairy
 
Assel shoes [autosaved]
Assel shoes [autosaved]Assel shoes [autosaved]
Assel shoes [autosaved]
 
Prerequisites for a jewelry business
Prerequisites for a jewelry businessPrerequisites for a jewelry business
Prerequisites for a jewelry business
 

Último

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 

Último (20)

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 

Spyware

  • 2. OBJECTIVES  What is spyware  Who is spying  How spyware operates  Impact of spyware  Risk of future security incidents  Common spyware forms 2
  • 3. WHAT IS SPYWARE  Spyware is one type of malicious software (malware) that collects information from a computing system without content  Spyware can capture keystrokes , screenshots , web from data , internet usage habits and other personal information  The data often delivered to online attackers who sell it to others or sell it themselves 3
  • 4. WHO IS SPYING  The people who use spyware include :  Online attackers  Marketing organization  Trusted insiders 4
  • 5. ONLINE ATTACKERS  Online attackers’ primary interest in spyware is using it to steal personal information for financial crimes  Such as carding (illicit trafficking in stolen credit card and credit card information) and identity theft  Or to sell that information to someone else who then executes more traditional crimes 5
  • 6. MARKETING ORGANIZATION  Marketing organization are interested in personal information such as email address , online shopping and browsing habits  That can be used to execute marketing campaigns like spam , browsers popups , homepage hijacking(changing the default web address for a users browser) 6
  • 7. TRUSTED INSIDERS  Trusted insiders include those who have physical access to computer system for legitimate purposes  Some examples are employs , contractors , temporary workers , and cleaning crews  For example an employee who uses spyware to collect corporate information that can be sold in underground economy used , for blackmail 7
  • 8. HOW SPYWARE OPERATES  Spyware tracks online activity looking for websites visited  Financial data or identity data such as credit card numbers on screen or entered into form field  When keywords of internet like names of banks , online payment system are observed , the spyware starts its data collection process 8
  • 9. IMPACT OF SPYWARE  Spyware can cause people to loss trust in the reliability of online business transactions  Similar to the problem of counterfeit currency in the physical world , spyware undermines confidence in online economic activity  Consumer willingness to participate in online monetary transactions decrease for fear of personal financial loss 9
  • 10. CONTINUE  Even when financial organizations cover an individual’s loss from online fraud  these costs plus the overhead required to administer loss prevention programs are eventually passed back to customers in the form of high service fees , interest rates  As a result , growth rates in commerce are slowed , cost increase , and demand shrinks 10
  • 11. RISK OF FUTURE SECURITY INCIDENTS  These sensitive information collected by spyware often includes authentication credentials that may be used for future access to the infected system  Once access is gained , additional information theft or malware installation take place  Another way spyware puts system at future risk is by installing backdoor access mechanisms 11
  • 12. COMMON SPYWARE FORMS  Browser session hijacking  Browser helper objects  Cookies and web bags  False antispyware tools  Autonomous spyware  Bots 12
  • 13. BROWSER SESSION HIJACKING  This class of spyware attempts to modify the users browsers setting  Hijacking spyware can be installed in various ways  These redirects lead users to advertisements that earn the hijacking commissions when they are visited 13
  • 14. BROWSER HELPER OBJECTS  Browser helper object (BHOs) are a feature of internet explorer that can be exploited by spyware and they are not always easy to detect  BHOs can access files , network recourses , and anything else the user who launched internet explorer can access  Another social engineering technique is inundating the user with repeated popup request to install the software 14
  • 15. COOKIES AND WEB BUGS Cookies are small pieces of information stored on a user’s system by a web server. During subsequent visits often , cookies are used for storing user authentication , preferences , and other type of user information They can be used to track a user across multiple websites 15
  • 16. FALSE ANTISPYWARE TOOLS  Applications available on some internet sites advertise themselves  as spyware detection or removable tools  In fact they themselves are spyware 16
  • 17. AUTONOMOUS SPYWARE  Autonomous spyware operates as a separate process or injects itself into other processes running on your system  This type of spyware often starts up when you log onto your computer and can frequently access anything on your system  Autonomous spyware is malicious application , it can be designed to perform any type of spying functions 17
  • 18. BOTS  A special class of malware known as a bot or zombie is one of largest malware problems  Bots are remote control agents installed on your system  Once a system is infected with a bot , it become part of a the bot network ( botnet) and is used in conjunction of other botnet members 18
  • 20. 20