View
221
Download
4
Tags:
Embed Size (px)
Citation preview
Computer Applications Computer Applications Reading SchemeReading Scheme
SpywareSpyware
Chan Yui Ming (6) L6AChan Yui Ming (6) L6A
DefinitionDefinition
SpywareSpyware• Internet jargonInternet jargon• ProgrammingProgramming
put in someone’s computer secretlyput in someone’s computer secretlygather information of usergather information of usertake partial control of a computertake partial control of a computer
• For advertisers or other interested partiesFor advertisers or other interested parties
Relation with AdwareRelation with Adware
• AdwareAdwareSoftware designed to Software designed to serve advertisingserve advertising
• Like a spywareLike a spywaretrackingtracking or or reportingreporting user information, user information,
without any notificationwithout any notification
Relation with CookiesRelation with Cookies
• CookieCookiestore informationstore information about an Internet use about an Internet use
rr
• Unknown Web site may store informatioUnknown Web site may store information about you n about you SpywareSpyware
• Public concern Public concern
Extra InformationExtra Information
When did spyware become popular?When did spyware become popular?
• 19991999
• By a popular computer game (Elf BowlinBy a popular computer game (Elf Bowling)g)
How it enters your How it enters your computer?computer?
1)1) As a As a virusvirus
2)2) Installing a Installing a new programnew program withowithout the users knowing its existenceut the users knowing its existence
3)3) By By drive-by dowloadingdrive-by dowloading Spyware installed just by visiting a Web SiteSpyware installed just by visiting a Web Site
Effects on ComputerEffects on Computer
• Create unwanted Create unwanted CPU activityCPU activitydisk usagedisk usagenetwork trafficnetwork traffic
• Difficulty in connecting to the InternetDifficulty in connecting to the Internet
Examples of spywareExamples of spyware
•CoolWebSearchCoolWebSearchinstall through the install through the weaknessweakness in Internet in Internet
ExplorerExplorerDirect trafficDirect traffic to some advertisement site to some advertisement site
like coolwebsearch.comlike coolwebsearch.compop-up adspop-up adsrewrite search engine resultrewrite search engine result
Examples of spywareExamples of spyware
• Internet OptimizerInternet OptimizerRedirectRedirect Internet Explorer error pages t Internet Explorer error pages t
o advertisingo advertisingCannot accessCannot access password-protected site password-protected site
ss
Examples of spywareExamples of spyware
Examples of Programs distrubuted withExamples of Programs distrubuted with sspyware:pyware:•DivXDivX•FlastGet (free version)FlastGet (free version)•DAEMON ToolsDAEMON Tools•BearshareBearshare
and more…and more…
LegalityLegality
• Not illegalNot illegal in any way in any way
• User may User may prefer not to useprefer not to use those products those products
• Places like Washington Places like Washington passed lawspassed laws, people , people other than the owner or operatorother than the owner or operator
illegal illegal toto install install softwaresoftware- altering Web-- altering Web-browser settings, disable computer-security browser settings, disable computer-security software software
Prevention and RemediesPrevention and Remedies
A A number of techniquesnumber of techniques emerged to emerged toremoveremove spyware spywareblockblock spyware spywarereduce the chancereduce the chance of getting spyware of getting spyware
Simplest remediesSimplest remedies: : •back upback up user data user data•ReinstallReinstall the OS the OS
Prevention and RemediesPrevention and Remedies
• Anti-spyware programsAnti-spyware programs• Work in two ways: Work in two ways:
1.1. Real-time protectionReal-time protection2.2. Detection and removalDetection and removal
• Examples: Lavasoft’s Ad-Aware SE, SpybotExamples: Lavasoft’s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more_Search & Destroy, spy sweeper and more
Screenshot of Lavasoft’s Ad-Aware SE
Prevention and RemediesPrevention and Remedies
• Virtual MachineVirtual Machineinhibit infectioninhibit infectionprovide separate environmentprovide separate environmentspyware enters the virtual environmentspyware enters the virtual environmenthost computer unaffectedhost computer unaffected
Situation in Hong KongSituation in Hong Kong
71
71.5
72
72.5
73
73.5
74
Percentage%
Networks inCompanies infected
by spyware
Hong Kong
Other countries
Situation in Hong KongSituation in Hong Kong
• Front-line staffFront-line stafflittle knowledgelittle knowledge on spyware on spyware
• A A serious problemserious problem to solve to solve
• Companies should Companies should focus on thisfocus on this
RememberRemember
Always use computers with Always use computers with awareness!!awareness!!
The EndThe End