SlideShare a Scribd company logo
1 of 17
Download to read offline
Let's Start
SpyWare
SpyWare
Is a piece of software intended to

monitor computer usage.
?
This data can be collected anonymously for
statistical purpose or with knowledge of whose
usage they are tracking.
History
First used 16 Oct 1995
on ther usernet
Parental tools
in home Networks
Origins in Marketing
Spyware was overtaken for

clandestine means
Scan hard drive for personal

information
Tracking web usage
Spyware is not a Virus
Cannot replicate Itself
Cannot be detected by anti-virus software
You have to agree to be spied on
Spyware Can ...
Track Browsing
Steal Identity
Corrupt Data
Create Profiles
Slow the computer
slow the Network
Change HomePage
Modify hosts File
Download Malware
Modify Registry
Change Settings
Hijack Computer
Leak Information
Violate HIPPA
Where is Spyware Found?
Spyware is most often found in Downloading/Sharing
utilities and Media player
Spyware is almost always associated with free
software.
Targeted pop-up ads from observed website visits.
May install other software or remove competitors
software.
Cookies
Cookies are Unique

identifiers placed on

your computet/mpbile

by a web server.
Browser Hijack
Can include altering

the Homepage,Url

prefilx Dns spoofing
P2P file sharing
Get private

information
Gmail, SMS, & access

to all data (account

number ,credit card

,password)
Personal
Data
Motivation
Ads
A
T
K
M
Adware
any software application
that displays advertisement

while the program is running.
Trojans
a software applcation that
appears harmless but can

inflict damage or data loss
to a system.
Keyboard Loggers
A type of surveillance

technology used to monitor and

record keystrokes. Cyber

criminals can use these to steal
sensitive information such as

authorization credentials,
enterprise data & computer
Mobile Spyware
A type of spyware that can

infect mobile devices that

typically enters via SMS &

MMS etc.
Type of Spyware
80%
How prevalent is spyware ?
95%
93% 89%
Internet users
interface
Never granted

permission
AOL Survy Results
Spyware components 

present in infected CPUs
Users are unaware of

spyware's presence
People
Prevention
Tools
Policy
analysis
People
Prevention
analysis
Awareness
Reaction to social engineering ploys
Extreme caution when loading software
Know how to recognize problems.
Know how to use the tools.
Understand the policies.
Don't click on links in pop-ups.
Don't believe spam reports.
Tools
Prevention
analysis
Choose good software tools
Know about good resources.
Take advantage of the P3P stangsrd.
keep the products updated
use them regularly
Policy
Prevention
analysis
Product Updates
Restrict or forbid dangerous practices.
Use appropriate settings
Consider notebook & home systems.
Report problems promptly.
P2P file sharing
public instant messaging
Unapproved software installation
Spyware Tools
System Mechanic

Ultimate Defense
Restoro Spybot SpywareBlaster
Cleaning and

repairing your pc.
Full Featured free
Antivirus.
Internet Security and
Malware removal.
Best for virus & spyware

removal.
Best for spyware

removal for advanced

users.
Best for browser protection

by blocking New Spyware

threats.
AVG Antivirus Comodo
Conclusion
Spyware, though not a particularly new problem

when defined generally, remains a problem that is

difficult to manage. While there is no silver bullet

to solve all of these problems, there is hope.
Rf..
https://en.wikipedia.org/wiki/Spyware
http://www.microsoft.com/athome/security/spywarewhat.mspx
http://www.spywareguide.com/index.php
http://gmail.google.com/gmail/help/more.html
Thank you
End
Do you have any questions?

More Related Content

Similar to Spyware.pdf

Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 

Similar to Spyware.pdf (20)

Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Computer security
Computer securityComputer security
Computer security
 
What is malware
What is malwareWhat is malware
What is malware
 
Spyware
SpywareSpyware
Spyware
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Spyware
SpywareSpyware
Spyware
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
spyware
spyware spyware
spyware
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 

Recently uploaded

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 

Recently uploaded (20)

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 

Spyware.pdf

  • 2. SpyWare Is a piece of software intended to monitor computer usage. ? This data can be collected anonymously for statistical purpose or with knowledge of whose usage they are tracking.
  • 3. History First used 16 Oct 1995 on ther usernet Parental tools in home Networks Origins in Marketing Spyware was overtaken for clandestine means Scan hard drive for personal information Tracking web usage
  • 4. Spyware is not a Virus Cannot replicate Itself Cannot be detected by anti-virus software You have to agree to be spied on
  • 5. Spyware Can ... Track Browsing Steal Identity Corrupt Data Create Profiles Slow the computer slow the Network Change HomePage Modify hosts File Download Malware Modify Registry Change Settings Hijack Computer Leak Information Violate HIPPA
  • 6. Where is Spyware Found? Spyware is most often found in Downloading/Sharing utilities and Media player Spyware is almost always associated with free software. Targeted pop-up ads from observed website visits. May install other software or remove competitors software.
  • 7. Cookies Cookies are Unique identifiers placed on your computet/mpbile by a web server. Browser Hijack Can include altering the Homepage,Url prefilx Dns spoofing P2P file sharing Get private information Gmail, SMS, & access to all data (account number ,credit card ,password) Personal Data Motivation Ads
  • 8. A T K M Adware any software application that displays advertisement while the program is running. Trojans a software applcation that appears harmless but can inflict damage or data loss to a system. Keyboard Loggers A type of surveillance technology used to monitor and record keystrokes. Cyber criminals can use these to steal sensitive information such as authorization credentials, enterprise data & computer Mobile Spyware A type of spyware that can infect mobile devices that typically enters via SMS & MMS etc. Type of Spyware
  • 9. 80% How prevalent is spyware ? 95% 93% 89% Internet users interface Never granted permission AOL Survy Results Spyware components present in infected CPUs Users are unaware of spyware's presence
  • 11. People Prevention analysis Awareness Reaction to social engineering ploys Extreme caution when loading software Know how to recognize problems. Know how to use the tools. Understand the policies. Don't click on links in pop-ups. Don't believe spam reports.
  • 12. Tools Prevention analysis Choose good software tools Know about good resources. Take advantage of the P3P stangsrd. keep the products updated use them regularly
  • 13. Policy Prevention analysis Product Updates Restrict or forbid dangerous practices. Use appropriate settings Consider notebook & home systems. Report problems promptly. P2P file sharing public instant messaging Unapproved software installation
  • 14. Spyware Tools System Mechanic Ultimate Defense Restoro Spybot SpywareBlaster Cleaning and repairing your pc. Full Featured free Antivirus. Internet Security and Malware removal. Best for virus & spyware removal. Best for spyware removal for advanced users. Best for browser protection by blocking New Spyware threats. AVG Antivirus Comodo
  • 15. Conclusion Spyware, though not a particularly new problem when defined generally, remains a problem that is difficult to manage. While there is no silver bullet to solve all of these problems, there is hope.
  • 17. Thank you End Do you have any questions?