computer applications reading scheme spyware chan yui ming (6) l6a

17
Computer Applications Computer Applications Reading Scheme Reading Scheme Spyware Spyware Chan Yui Ming (6) L6A Chan Yui Ming (6) L6A

Post on 18-Dec-2015

218 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Computer Applications Computer Applications Reading SchemeReading Scheme

SpywareSpyware

Chan Yui Ming (6) L6AChan Yui Ming (6) L6A

Page 2: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

DefinitionDefinition

SpywareSpyware• Internet jargonInternet jargon• ProgrammingProgramming

put in someone’s computer secretlyput in someone’s computer secretlygather information of usergather information of usertake partial control of a computertake partial control of a computer

• For advertisers or other interested partiesFor advertisers or other interested parties

Page 3: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Relation with AdwareRelation with Adware

• AdwareAdwareSoftware designed to Software designed to serve advertisingserve advertising

• Like a spywareLike a spywaretrackingtracking or or reportingreporting user information, user information,

without any notificationwithout any notification

Page 4: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Relation with CookiesRelation with Cookies

• CookieCookiestore informationstore information about an Internet use about an Internet use

rr

• Unknown Web site may store informatioUnknown Web site may store information about you n about you SpywareSpyware

• Public concern Public concern

Page 5: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Extra InformationExtra Information

When did spyware become popular?When did spyware become popular?

• 19991999

• By a popular computer game (Elf BowlinBy a popular computer game (Elf Bowling)g)

Page 6: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

How it enters your How it enters your computer?computer?

1)1) As a As a virusvirus

2)2) Installing a Installing a new programnew program withowithout the users knowing its existenceut the users knowing its existence

3)3) By By drive-by dowloadingdrive-by dowloading Spyware installed just by visiting a Web SiteSpyware installed just by visiting a Web Site

Page 7: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Effects on ComputerEffects on Computer

• Create unwanted Create unwanted CPU activityCPU activitydisk usagedisk usagenetwork trafficnetwork traffic

• Difficulty in connecting to the InternetDifficulty in connecting to the Internet

Page 8: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Examples of spywareExamples of spyware

•CoolWebSearchCoolWebSearchinstall through the install through the weaknessweakness in Internet in Internet

ExplorerExplorerDirect trafficDirect traffic to some advertisement site to some advertisement site

like coolwebsearch.comlike coolwebsearch.compop-up adspop-up adsrewrite search engine resultrewrite search engine result

Page 9: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Examples of spywareExamples of spyware

• Internet OptimizerInternet OptimizerRedirectRedirect Internet Explorer error pages t Internet Explorer error pages t

o advertisingo advertisingCannot accessCannot access password-protected site password-protected site

ss

Page 10: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Examples of spywareExamples of spyware

Examples of Programs distrubuted withExamples of Programs distrubuted with sspyware:pyware:•DivXDivX•FlastGet (free version)FlastGet (free version)•DAEMON ToolsDAEMON Tools•BearshareBearshare

and more…and more…

Page 11: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

LegalityLegality

• Not illegalNot illegal in any way in any way

• User may User may prefer not to useprefer not to use those products those products

• Places like Washington Places like Washington passed lawspassed laws, people , people other than the owner or operatorother than the owner or operator

illegal illegal toto install install softwaresoftware- altering Web-- altering Web-browser settings, disable computer-security browser settings, disable computer-security software software

Page 12: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Prevention and RemediesPrevention and Remedies

A A number of techniquesnumber of techniques emerged to emerged toremoveremove spyware spywareblockblock spyware spywarereduce the chancereduce the chance of getting spyware of getting spyware

Simplest remediesSimplest remedies: : •back upback up user data user data•ReinstallReinstall the OS the OS

Page 13: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Prevention and RemediesPrevention and Remedies

• Anti-spyware programsAnti-spyware programs• Work in two ways: Work in two ways:

1.1. Real-time protectionReal-time protection2.2. Detection and removalDetection and removal

• Examples: Lavasoft’s Ad-Aware SE, SpybotExamples: Lavasoft’s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more_Search & Destroy, spy sweeper and more

Screenshot of Lavasoft’s Ad-Aware SE

Page 14: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Prevention and RemediesPrevention and Remedies

• Virtual MachineVirtual Machineinhibit infectioninhibit infectionprovide separate environmentprovide separate environmentspyware enters the virtual environmentspyware enters the virtual environmenthost computer unaffectedhost computer unaffected

Page 15: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Situation in Hong KongSituation in Hong Kong

71

71.5

72

72.5

73

73.5

74

Percentage%

Networks inCompanies infected

by spyware

Hong Kong

Other countries

Page 16: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Situation in Hong KongSituation in Hong Kong

• Front-line staffFront-line stafflittle knowledgelittle knowledge on spyware on spyware

• A A serious problemserious problem to solve to solve

• Companies should Companies should focus on thisfocus on this

Page 17: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

RememberRemember

Always use computers with Always use computers with awareness!!awareness!!

The EndThe End