SlideShare a Scribd company logo
1 of 16
SPYWARE
Prepared by: Vikas Patel
(160010107039)
Vaibhav Soni
(160010107055)
Guided by: Professor Kiran Macwan
1.INTRODUCTION
2.Types of SPYWARE
3.Working principal
4.Spyware Behaviour on OS
5.Advantages & Disadvantages
Contents
What is
spyware
?
 Spyware is software that aims to gather information about a
person or organization sometimes without their knowledge,
that may send such information to another entity without the
consumer's consent, that asserts control over a device without
the consumer's knowledge, or it may send such information to
another entity with the consumer's consent, through cookies
 Spyware is programming that is put in someone's computer to
secretly gather information about the user and relay it to
advertisers or other interested parties.
Working
Principal
 Spyware does necessarily not spread in the same way as
a virus or worm because infected systems generally do not
attempt to transmit or copy the software to other computers.
Instead, spyware installs itself on a system by deceiving the user
or by exploiting software vulnerabilities.
 Most spyware is installed without knowledge, or by using
deceptive tactics. Spyware may try to deceive users by bundling
itself with desirable software. Other common tactics are using
a Trojan horse, spy gadgets that look like normal devices but turn
out to be something else, such as a USB Key logger. These
devices actually are connected to the device as memory units
but are capable of recording each stroke made on the keyboard
Types
of
spyware
1. Adware
2. System monitors
3.Tracking cookies
4.Trojans
Spyware is classified into four parts.
Adware
 Adware, or advertising-supported software,
is software that generates revenue for its developer by
automatically generating online advertisements in the
user interface of the software or on a screen presented
to the user during the installation process.
 Some legitimate application software is offered as
either a free version that is advertising-supported or as
a paid version without advertisements. Users would
purchase a software license code or a separate piece of
software for an ad-free experience.This type of adware
gives users the opportunity to access the software
without making large payments.
Example
s of
Adware
Aartemis Search
BatBrowse
Beamrise Search
Coupon Pigeon
JollyWallet
OfferMosquito
DealFairy
System
monitor
s
 System monitors are applications designed to monitor
computer activity to various degrees.These programs
can capture virtually everything you do on your
computer including recording all keystrokes, emails,
chat room dialogue, websites visited, and programs
run.
 System monitors usually run in the background so that
you do not know that you are being monitored.The
information gathered by the system monitor is stored
on your computer in an encrypted log file for later
retrieval. Some programs are capable of emailing the
log files to another location.
Tracking
cookies
 A Cookie is a plain text file that is stored on your computer in
a cookies folder that stores data about your browsing
sessions. Cookies are used by many websites to track visitor
information. Hackers can steal your cookies and can generate
password’s and user account can be at threat.
 Tracking cookies are used to track users' web browsing habits.This
can also be done to some extent by using the IP address of the
computer requesting the page or the referer field of
the HTTP request header, but cookies allow for greater precision.
By analyzing this log file, it is then possible to find out which pages
the user has visited, in what sequence, and for how long.
 Some of the biggest companies using tracking cookies
include:
AddThis
Adnxs
Doubleclick
Facebook
Google
Quantserve
Scorecard Research
Twitter
Trojans
 Trojans:- Trojans Horses or Trojans are malicious programs
that appear as harmless or even desirable applications. Trojans
are designed to cause loss or theft of computer data, and to
destroy your system. Some Trojans, called RATs (Remote
Administration Tools), allow an attacker to gain unrestricted
access of your computer whenever you are online.
 The victim receives an official-looking email with an
attachment. The attachment contains malicious code that is
executed as soon as the victim clicks on the attachment.
Because nothing bad happens and the computer continues to
work as expected, the victim does not suspect that the
attachment is actually a Trojan horse and his computing device
is now infected.
Remote
Administra
tion Tools
Nanocore
Blackshades
Plasma
Jspy
NJRAT
Revenge Rat
Darkcomet
Effects and
behaviours
 A spyware rarely operates alone on a computer; an
affected machine usually has multiple infections. Users
frequently notice unwanted behaviour and degradation of
system performance. A spyware infestation can create
significant unwanted CPU activity, disk usage, and
network traffic. Stability issues, such as applications
freezing, failure to boot, and system-wide crashes are also
common. Spyware, which interferes with networking
software commonly causes difficulty connecting to the
Internet.
 Moreover, some types of spyware disable
software firewalls and antivirus software, and/or reduce
browser security settings, which opens the system to
further opportunistic infections. Some spyware disables or
even removes competing spyware programs, on the
grounds that more spyware-related annoyances increase
the likelihood that users will take action to remove the
programs.
ADVANTAG
ES &
DISADVANT
AGES
 Advantages of spyware is that you can keep watch on
your children's continuously through software that spy
your child’s computer without knowing them, you can
check what kind of sites they access when they use the
internet when you are away.You can check what they
do on social media.
 Disadvantages of spyware: Some time if user installed
malicious software which can steal their password and
private data that can led into big trouble as their
private data will be accessed without their consent and
their social media account can be hacked, money can
be withdrawn without knowing them.
Preferenc
es
 https://searchsecurity.techtarget.com/definition/adware
 https://www.internetworldstats.com/articles/art035.html
 https://en.wikipedia.org/wiki/HTTP_cookie#Tracking
 https://searchsecurity.techtarget.com/definition/Trojan-
horse
Spyware-A online threat to privacy

More Related Content

What's hot

Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virusmissstevenson01
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been HackedCyware
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Systweak Software
 

What's hot (20)

Spyware
SpywareSpyware
Spyware
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
spyware
spyware spyware
spyware
 
spyware
spywarespyware
spyware
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Spyware
SpywareSpyware
Spyware
 
IT viruses
 IT viruses IT viruses
IT viruses
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Malware
MalwareMalware
Malware
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!
 

Similar to Spyware-A online threat to privacy

Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)SHUBHA CHATURVEDI
 
wiki 1 spyware
wiki 1 spywarewiki 1 spyware
wiki 1 spywarenuramirah
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxChaitanyaMundra2
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 

Similar to Spyware-A online threat to privacy (20)

Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
wiki 1 spyware
wiki 1 spywarewiki 1 spyware
wiki 1 spyware
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Security Software
Security SoftwareSecurity Software
Security Software
 
What is malware
What is malwareWhat is malware
What is malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Computer security
Computer securityComputer security
Computer security
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Spyware-A online threat to privacy

  • 1. SPYWARE Prepared by: Vikas Patel (160010107039) Vaibhav Soni (160010107055) Guided by: Professor Kiran Macwan
  • 2. 1.INTRODUCTION 2.Types of SPYWARE 3.Working principal 4.Spyware Behaviour on OS 5.Advantages & Disadvantages Contents
  • 3. What is spyware ?  Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies  Spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
  • 4. Working Principal  Spyware does necessarily not spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system by deceiving the user or by exploiting software vulnerabilities.  Most spyware is installed without knowledge, or by using deceptive tactics. Spyware may try to deceive users by bundling itself with desirable software. Other common tactics are using a Trojan horse, spy gadgets that look like normal devices but turn out to be something else, such as a USB Key logger. These devices actually are connected to the device as memory units but are capable of recording each stroke made on the keyboard
  • 5. Types of spyware 1. Adware 2. System monitors 3.Tracking cookies 4.Trojans Spyware is classified into four parts.
  • 6. Adware  Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.  Some legitimate application software is offered as either a free version that is advertising-supported or as a paid version without advertisements. Users would purchase a software license code or a separate piece of software for an ad-free experience.This type of adware gives users the opportunity to access the software without making large payments.
  • 7. Example s of Adware Aartemis Search BatBrowse Beamrise Search Coupon Pigeon JollyWallet OfferMosquito DealFairy
  • 8. System monitor s  System monitors are applications designed to monitor computer activity to various degrees.These programs can capture virtually everything you do on your computer including recording all keystrokes, emails, chat room dialogue, websites visited, and programs run.  System monitors usually run in the background so that you do not know that you are being monitored.The information gathered by the system monitor is stored on your computer in an encrypted log file for later retrieval. Some programs are capable of emailing the log files to another location.
  • 9. Tracking cookies  A Cookie is a plain text file that is stored on your computer in a cookies folder that stores data about your browsing sessions. Cookies are used by many websites to track visitor information. Hackers can steal your cookies and can generate password’s and user account can be at threat.  Tracking cookies are used to track users' web browsing habits.This can also be done to some extent by using the IP address of the computer requesting the page or the referer field of the HTTP request header, but cookies allow for greater precision. By analyzing this log file, it is then possible to find out which pages the user has visited, in what sequence, and for how long.
  • 10.  Some of the biggest companies using tracking cookies include: AddThis Adnxs Doubleclick Facebook Google Quantserve Scorecard Research Twitter
  • 11. Trojans  Trojans:- Trojans Horses or Trojans are malicious programs that appear as harmless or even desirable applications. Trojans are designed to cause loss or theft of computer data, and to destroy your system. Some Trojans, called RATs (Remote Administration Tools), allow an attacker to gain unrestricted access of your computer whenever you are online.  The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment. Because nothing bad happens and the computer continues to work as expected, the victim does not suspect that the attachment is actually a Trojan horse and his computing device is now infected.
  • 13. Effects and behaviours  A spyware rarely operates alone on a computer; an affected machine usually has multiple infections. Users frequently notice unwanted behaviour and degradation of system performance. A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic. Stability issues, such as applications freezing, failure to boot, and system-wide crashes are also common. Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet.  Moreover, some types of spyware disable software firewalls and antivirus software, and/or reduce browser security settings, which opens the system to further opportunistic infections. Some spyware disables or even removes competing spyware programs, on the grounds that more spyware-related annoyances increase the likelihood that users will take action to remove the programs.
  • 14. ADVANTAG ES & DISADVANT AGES  Advantages of spyware is that you can keep watch on your children's continuously through software that spy your child’s computer without knowing them, you can check what kind of sites they access when they use the internet when you are away.You can check what they do on social media.  Disadvantages of spyware: Some time if user installed malicious software which can steal their password and private data that can led into big trouble as their private data will be accessed without their consent and their social media account can be hacked, money can be withdrawn without knowing them.
  • 15. Preferenc es  https://searchsecurity.techtarget.com/definition/adware  https://www.internetworldstats.com/articles/art035.html  https://en.wikipedia.org/wiki/HTTP_cookie#Tracking  https://searchsecurity.techtarget.com/definition/Trojan- horse