Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
IT presentation on etiquettes, spyware and trojans
1. INFORMATION TECHNOLOGY
A
PRESENTATION ON
IT - ETIQUETTES
PRESENTATION BY
ANAY MISHRA
ATUL MAINDOLA
NAVDEEP MALVIYA
SMIT SONI
RONAK GOYAL
ISHITA LUTHARA
SUBMITTED TO
PROF. BHAWANA SHARMA
2. AGENDA
• INTRODUCTION
• BASICS
• INTERNET ETIQUETTES
• ASPECTS
• SPYWARE & TROJANS
• SYMPTOMS OF SPYWARE & TROJAN ATTACK
• SUMMARY OF EFFECT
• SIMILARITIES & DIFFERENCES
• INSTALLATION
• EFFECTS
• EXAMPLE OF SPYWARE
• EXAMPLES OF TROJAN HORSE
• VULNERABLE SYSTEMS
• CONCLUSIONS
3. INTRODUCTION
Rapid Info
processing
• Efficient and cost-effective solution
• Digitized information
• Automation - Computer
Digital
Information
• Information privacy
• Information reliability
• Information availability
Information
security
• confidentiality
• Authenticy,Integrity&Availability
Challenges
What is Information Technology ?? Computer !!!!!!!!!!!! ??????
4. BASICS
INFORMATION ARCHITECTURE
• DATA LIFECYCLE
• DATA FLOW
• DATA STORAGE
INFORMATION CLASSIFICATION
• PRIVATE
• PUBLIC
• CONFIDENTIAL
INFORMATION ASSETS
• PEOPLE
• PROCESS
• TECHNOLOGY
5. INTERNET ETIQUETTES
Etiquette in technology governs what conduct is socially acceptable in an online or digital
situation. While etiquette is ingrained into culture, etiquette in technology is a fairly recent
concept. The rules of etiquette that apply when communicating over the Internet or social networks
or devices are different from those applying when communicating in person or by audio (such as
telephone) or videophone (such as Skype video). It is a social code of network communication.
Communicating with others via the Internet without misunderstandings in the heat of the moment
can be challenging, mainly because facial expressions and body language cannot be interpreted on
cyberspace. Therefore, several recommendations to attempt to safeguard against these
misunderstandings have been proposed.
7. SPYWARE & TROJANS
A general term for a program that surreptitiously monitors your actions. While they
are sometimes sinister, like a remote control program used by a hacker, software
companies have been known to use Spyware to gather data about customers.
The practice is generally frowned upon.
An apparently useful and innocent program containing additional hidden code
which allows the unauthorized collection, exploitation, falsification, or
destruction of data.
8. SYMPTOMS OF SPYWARE & TROJAN ATTACK
• Targeted Pop-ups
• Slow Connection
• Targeted E-Mail (Spam)
• Unauthorized Access
• Spam Relaying
• System Crash
• Program Customisation
9. SUMMARY OF EFFECT
• Collection of data from your computer without consent
• Execution of code without consent
• Assignment of a unique code to identify you
• Collection of data pertaining to your habitual use
• Installation on your computer without your consent
• Inability to remove the software
• Performing other undesirable tasks without consent
10. SIMILARITIES / DIFFERENCES
Spyware Trojan Horses
Commercially Motivated Malicious
Internet connection required Any network connection required
Initiates remote connection Receives incoming connection
Purpose: To monitor activity Purpose: To control activity
Collects data and displays pop-ups Unauthorized access and control
Legal Illegal
Not Detectable with Virus Checker Detectable with Virus Checker
Age: Relatively New (< 5 Years) Age: Relatively Old ( > 20 Years)
Memory Resident Processes
Surreptitiously installed without user’s consent or understanding
Creates a security vulnerability
11. TROJAN HORSE & ITS INSTALLATION
• Secretly installed when an infected executable is run
• Much like a virus
• Executables typically come from P2P networks or unscrupulous websites
• ActiveX controls on websites
• ActiveX allows automatic installation of software from websites
• Users probably does not know what they are running
• Misleading descriptions often given
• Not sandboxed!
• Digital signatures used, signing not necessary
13. EFFECTS
• Allows remote access
– To spy
– To disrupt
– To relay a malicious connection, so as to disguise the attacker’s location
(spam, hacking)
– To access resources (i.e. bandwidth, files)
– To launch a DDoS attack
14. EXAMPLE: BACK ORIFICE (SPYWARE )
• Produced by the “Cult of the Dead Cow”
• Win95/98 is vulnerable
• Similar operation to NetBus
• Name similar to MS Product of the time
15. TROJAN HORSE EXAMPLES
• Integrates with the NT kernel
• Very dangerous
• Virtually undetectable once installed
• Hides from administrator as well as user
• Private TCP/IP stack (LAN only)
{M$ ROOTKIT}
16. TROJAN HORSE EXAMPLES
• Commercial
• Web-based client
• Assassin Trojan
• Custom builds may be purchased
• These are not found by virus scanners
• Firewall circumvention technology
{I-SPYNOW}
17. VULNERABLE SYSTEMS
DANGEROUS
Number of Trojans in common use…
RELATIVELY SAFE
Linux/Unix
Win9x
MacOS
WinNT
MacOSX
WinNT refers to Windows NT 4, 2000, XP and Server 2003.
Win9x refers to Windows 95, 95SE, 98 and ME.
Information Source: McAfee Security - http://us.mcafee.com/
19. SECURITY IMPLICATIONS
Divulge personal data
Backdoors into system
System corruption
Disruption / Irritation
Aids identity theft
Easy virus distribution
Increased spam
Mass data collection
Consequences unknown
Web becomes unusable
Web cons outweigh pros
Cost of preventions
More development work
More IP addresses (IPv6)
LONG TERMSHORT TERM
20. FIREWALLS
3 Types…
• Packet Filtering – Examines attributes of packet.
• Application Layer – Hides the network by impersonating the server (proxy).
• Statefull Inspection – Examines both the state and context of the packets.
• Regardless of type; must be configured to work properly.
• Access rules must be defined and entered into firewall.
21.
22. QUESTIONNAIRE
Q. What Is a Trojan ?
Q. What Is Spyware ?
Q. What Is The Differences Between Spyware & Trojan ?
Q. What Are The Ways For Prevention ?
Q. What Is Firewall ?