SlideShare ist ein Scribd-Unternehmen logo
1 von 20
SPYWARE
By liza ormol
OBJECTIVES
 What is spyware
 Who is spying
 How spyware operates
 Impact of spyware
 Risk of future security incidents
 Common spyware forms
2
WHAT IS SPYWARE
 Spyware is one type of malicious software
(malware) that collects information from a
computing system without content
 Spyware can capture keystrokes , screenshots ,
web from data , internet usage habits and other
personal information
 The data often delivered to online attackers who
sell it to others or sell it themselves
3
WHO IS SPYING
 The people who use spyware include :
 Online attackers
 Marketing organization
 Trusted insiders
4
ONLINE ATTACKERS
 Online attackers’ primary interest in spyware is
using it to steal personal information for financial
crimes
 Such as carding (illicit trafficking in stolen credit
card and credit card information) and identity theft
 Or to sell that information to someone else who
then executes more traditional crimes
5
MARKETING ORGANIZATION
 Marketing organization are interested in personal
information such as email address , online
shopping and browsing habits
 That can be used to execute marketing campaigns
like spam , browsers popups , homepage
hijacking(changing the default web address for a
users browser)
6
TRUSTED INSIDERS
 Trusted insiders include those who have physical
access to computer system for legitimate purposes
 Some examples are employs , contractors ,
temporary workers , and cleaning crews
 For example an employee who uses spyware to
collect corporate information that can be sold in
underground economy used , for blackmail
7
HOW SPYWARE OPERATES
 Spyware tracks online activity looking for websites
visited
 Financial data or identity data such as credit card
numbers on screen or entered into form field
 When keywords of internet like names of banks ,
online payment system are observed , the spyware
starts its data collection process
8
IMPACT OF SPYWARE
 Spyware can cause people to loss trust in the
reliability of online business transactions
 Similar to the problem of counterfeit currency in the
physical world , spyware undermines confidence in
online economic activity
 Consumer willingness to participate in online
monetary transactions decrease for fear of personal
financial loss
9
CONTINUE
 Even when financial organizations cover an
individual’s loss from online fraud
 these costs plus the overhead required to
administer loss prevention programs are eventually
passed back to customers in the form of high
service fees , interest rates
 As a result , growth rates in commerce are slowed ,
cost increase , and demand shrinks
10
RISK OF FUTURE SECURITY INCIDENTS
 These sensitive information collected by spyware
often includes authentication credentials that may
be used for future access to the infected system
 Once access is gained , additional information theft
or malware installation take place
 Another way spyware puts system at future risk is
by installing backdoor access mechanisms
11
COMMON SPYWARE FORMS
 Browser session hijacking
 Browser helper objects
 Cookies and web bags
 False antispyware tools
 Autonomous spyware
 Bots
12
BROWSER SESSION HIJACKING
 This class of spyware attempts to modify the users
browsers setting
 Hijacking spyware can be installed in various ways
 These redirects lead users to advertisements that
earn the hijacking commissions when they are
visited
13
BROWSER HELPER OBJECTS
 Browser helper object (BHOs) are a feature of
internet explorer that can be exploited by spyware
and they are not always easy to detect
 BHOs can access files , network recourses , and
anything else the user who launched internet
explorer can access
 Another social engineering technique is inundating
the user with repeated popup request to install the
software
14
COOKIES AND WEB BUGS
Cookies are small pieces of information stored on a
user’s system by a web server. During subsequent
visits
often , cookies are used for storing user
authentication , preferences , and other type of user
information
They can be used to track a user across multiple
websites
15
FALSE ANTISPYWARE TOOLS
 Applications available on some internet sites
advertise themselves
 as spyware detection or removable tools
 In fact they themselves are spyware
16
AUTONOMOUS SPYWARE
 Autonomous spyware operates as a separate
process or injects itself into other processes
running on your system
 This type of spyware often starts up when you log
onto your computer and can frequently access
anything on your system
 Autonomous spyware is malicious application , it
can be designed to perform any type of spying
functions
17
BOTS
 A special class of malware known as a bot or
zombie is one of largest malware problems
 Bots are remote control agents installed on your
system
 Once a system is infected with a bot , it become
part of a the bot network ( botnet) and is used in
conjunction of other botnet members
18
REFERENCE
 Spywarehome_0905.pdf
19
20

Weitere ähnliche Inhalte

Was ist angesagt?

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Was ist angesagt? (20)

What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
spyware
spywarespyware
spyware
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
MALWARE
MALWAREMALWARE
MALWARE
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 

Andere mochten auch

Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
Mobile generation technology
Mobile generation technologyMobile generation technology
Mobile generation technology
Vishal Rajput
 
Wild communications
Wild communicationsWild communications
Wild communications
WC
 

Andere mochten auch (18)

Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Mobile generation technology
Mobile generation technologyMobile generation technology
Mobile generation technology
 
Wild communications
Wild communicationsWild communications
Wild communications
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Spyware
SpywareSpyware
Spyware
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
 

Ähnlich wie Spyware

cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 

Ähnlich wie Spyware (20)

Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Safety from Spyware
Safety from SpywareSafety from Spyware
Safety from Spyware
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
ESC Information Booklet EN
ESC Information Booklet ENESC Information Booklet EN
ESC Information Booklet EN
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Information security
Information securityInformation security
Information security
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 

Mehr von Kardan university, kabul , Afghanistan (11)

Interview skills
Interview skillsInterview skills
Interview skills
 
Investors’ views’ of investment in afghanistan
Investors’ views’ of investment in afghanistanInvestors’ views’ of investment in afghanistan
Investors’ views’ of investment in afghanistan
 
Effects of stress on human health
Effects of stress on human healthEffects of stress on human health
Effects of stress on human health
 
Three permanent members of europe(germany , france ,
Three permanent members of europe(germany , france ,Three permanent members of europe(germany , france ,
Three permanent members of europe(germany , france ,
 
Death penality
Death penalityDeath penality
Death penality
 
Causes of 2009 financial crisis in us
Causes of 2009 financial crisis in usCauses of 2009 financial crisis in us
Causes of 2009 financial crisis in us
 
Afghanistan economy
Afghanistan economyAfghanistan economy
Afghanistan economy
 
Walmart
WalmartWalmart
Walmart
 
Bayaaz dairy
Bayaaz dairyBayaaz dairy
Bayaaz dairy
 
Assel shoes [autosaved]
Assel shoes [autosaved]Assel shoes [autosaved]
Assel shoes [autosaved]
 
Prerequisites for a jewelry business
Prerequisites for a jewelry businessPrerequisites for a jewelry business
Prerequisites for a jewelry business
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Spyware

  • 2. OBJECTIVES  What is spyware  Who is spying  How spyware operates  Impact of spyware  Risk of future security incidents  Common spyware forms 2
  • 3. WHAT IS SPYWARE  Spyware is one type of malicious software (malware) that collects information from a computing system without content  Spyware can capture keystrokes , screenshots , web from data , internet usage habits and other personal information  The data often delivered to online attackers who sell it to others or sell it themselves 3
  • 4. WHO IS SPYING  The people who use spyware include :  Online attackers  Marketing organization  Trusted insiders 4
  • 5. ONLINE ATTACKERS  Online attackers’ primary interest in spyware is using it to steal personal information for financial crimes  Such as carding (illicit trafficking in stolen credit card and credit card information) and identity theft  Or to sell that information to someone else who then executes more traditional crimes 5
  • 6. MARKETING ORGANIZATION  Marketing organization are interested in personal information such as email address , online shopping and browsing habits  That can be used to execute marketing campaigns like spam , browsers popups , homepage hijacking(changing the default web address for a users browser) 6
  • 7. TRUSTED INSIDERS  Trusted insiders include those who have physical access to computer system for legitimate purposes  Some examples are employs , contractors , temporary workers , and cleaning crews  For example an employee who uses spyware to collect corporate information that can be sold in underground economy used , for blackmail 7
  • 8. HOW SPYWARE OPERATES  Spyware tracks online activity looking for websites visited  Financial data or identity data such as credit card numbers on screen or entered into form field  When keywords of internet like names of banks , online payment system are observed , the spyware starts its data collection process 8
  • 9. IMPACT OF SPYWARE  Spyware can cause people to loss trust in the reliability of online business transactions  Similar to the problem of counterfeit currency in the physical world , spyware undermines confidence in online economic activity  Consumer willingness to participate in online monetary transactions decrease for fear of personal financial loss 9
  • 10. CONTINUE  Even when financial organizations cover an individual’s loss from online fraud  these costs plus the overhead required to administer loss prevention programs are eventually passed back to customers in the form of high service fees , interest rates  As a result , growth rates in commerce are slowed , cost increase , and demand shrinks 10
  • 11. RISK OF FUTURE SECURITY INCIDENTS  These sensitive information collected by spyware often includes authentication credentials that may be used for future access to the infected system  Once access is gained , additional information theft or malware installation take place  Another way spyware puts system at future risk is by installing backdoor access mechanisms 11
  • 12. COMMON SPYWARE FORMS  Browser session hijacking  Browser helper objects  Cookies and web bags  False antispyware tools  Autonomous spyware  Bots 12
  • 13. BROWSER SESSION HIJACKING  This class of spyware attempts to modify the users browsers setting  Hijacking spyware can be installed in various ways  These redirects lead users to advertisements that earn the hijacking commissions when they are visited 13
  • 14. BROWSER HELPER OBJECTS  Browser helper object (BHOs) are a feature of internet explorer that can be exploited by spyware and they are not always easy to detect  BHOs can access files , network recourses , and anything else the user who launched internet explorer can access  Another social engineering technique is inundating the user with repeated popup request to install the software 14
  • 15. COOKIES AND WEB BUGS Cookies are small pieces of information stored on a user’s system by a web server. During subsequent visits often , cookies are used for storing user authentication , preferences , and other type of user information They can be used to track a user across multiple websites 15
  • 16. FALSE ANTISPYWARE TOOLS  Applications available on some internet sites advertise themselves  as spyware detection or removable tools  In fact they themselves are spyware 16
  • 17. AUTONOMOUS SPYWARE  Autonomous spyware operates as a separate process or injects itself into other processes running on your system  This type of spyware often starts up when you log onto your computer and can frequently access anything on your system  Autonomous spyware is malicious application , it can be designed to perform any type of spying functions 17
  • 18. BOTS  A special class of malware known as a bot or zombie is one of largest malware problems  Bots are remote control agents installed on your system  Once a system is infected with a bot , it become part of a the bot network ( botnet) and is used in conjunction of other botnet members 18
  • 20. 20