4. What Are Spywares ?
Applicationsthat send information from your
computer to thecreator of thespyware
Consistsof an corefunctionality and ahidden
functionality of information gathering
Can beused for marketing information, to determine
their stancewith regard to competitorsand market
trends
Can also beused to log keystrokesand send thoseto
whomever
6. Definition
Spywareissoftware
that aidsin gathering information about a
person or organization
without their knowledge
may send such information to another
entity without theconsumer'sconsent
assertscontrol over acomputer
without theconsumer'sknowledge.
9. Types of Spyware
Spywarecan bebroken down into four different
categories:
System monitors
Trojans
Adware
Tracking cookies
10. System Monitors
Tracking Softwareused to monitor computer activity
keystrokes, e-mails, chat room conversations, instant
messages, Web sitesvisited, programsrun, timespent on
Web sitesor using programs, or user-namesand
passwords.
Theinformation istypically either stored for later
retrieval or transmitted to theremoteprocessor person
employing theMonitor
Key-loggersand Screen Scrapersaretypesof System
Monitors.
11. Trojans
TrojansHorsesor Trojansaremaliciousprogramsthat appear
asharmlessor even desirableapplications.
Designed to causelossor theft of computer data, and to
destroy your system.
Seven major types
RemoteAccessTrojans
DataSending Trojans
DestructiveTrojans
Proxy Trojans
FTPTrojans
Security SoftwareDisabler Trojans
Denial-of-Serviceattack (DoS) Trojans
14. Adware
It isany softwarepackagewhich automatically renders
advertisementsin order to generaterevenuefor itsauthor.
Softwarethat displayspop-up advertisementstuned to the
userscurrent activity, potentially reporting aggregateor
anonymized browsing behavior to athird party
Track personal information (including your age, gender,
location, buying preferences, surfing habits, etc.)
15. Tracking Cookies
Cookiesthat can track your Web activities
May includecookiesthat contain
• user names
• passwords
other privateinformation that you enter on
web sites(SSN, banking info, credit cards)
16. Preventive Techniques
Don't install any application unlessyou arecertain of what it
does or where it came from.
Alwaysread thelicenseagreement
Softwareand OSupgrades
Utilizebrowser'ssecurity settings
UseAnti-Spyware
Spy Sweeper
Microsoft WindowsAnti-Spyware
SpywareDoctor
SpywareSlayer
Spy Killer
Spy Remover
17. What are Keyloggers?
Keystrokelogging, or keyboard capturing
theaction of recording (or logging) thekeys
struck on akeyboard, typically in acovert manner
so that theperson using thekeyboard isunaware
that their actionsarebeing monitored
18. Typesof Keyloggers
HardwareKeyloggers SoftwareKeyloggers
Installs in 5 seco nds, simply plug
it in.
Requires a passwo rd to lo g into
the co mputer.
Can be installed witho ut lo gging
into the co mputer.
Requires administratio n rights to
install.
Can be remo ved, and the
info rmatio n retrieved o n ano ther
co mputer.
Requires that so ftware be installed
o n the co mputer.
Requires reaching behind the
co mputer to plug the device in.
Can reco rd o perating system
events such as page file size, etc.