170 likes | 260 Views
Computer Security. By: Edward Woltersdorf & Jim Young. Keylogger. Definition – diagnostic tool used in software development captures the user’s keystrokes. Purposes – monitors employee productivity, police use, illegal spying.
E N D
ComputerSecurity By: Edward Woltersdorf & Jim Young
Keylogger • Definition – diagnostic tool used in software development captures the user’s keystrokes. • Purposes – monitors employee productivity, police use, illegal spying. • How it effects computer – Captures keystrokes and records them in a file. This file is usually sent to another computer for analysis.
Spam • Definition – unsolicited bulk email messages. Sometimes used to transmit viruses. • Purpose – sell products, market products, scam people, lead people to sites for ID theft. • How it effects computer – Puts a virus or program into the computer to track or accomplish tasks without the user’s knowledge.
Spyware • Definition – computer software that is installed secretly (very rarely knowingly) on a personal computer to intercept or take partial control over the user’s interaction with the computer, generally without the user’s consent. • Purpose – to collect, organize and transmit data back to a centralized location for purposes of marketing, ID theft, or corruption of system resources. • How it effects computer – runs programs in the background slowing computer’s process to a crawl. Some data transmitted can be done illegally.
Virus • Definition - computer program that can copy itself and infect a computer without permission or knowledge of the user. • Purpose – generally made for malicious intent, but sometimes for humor or fun. • How it effects the computer - Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.
Why Do You Care? • ID Theft • Surveys in the USA from 2003 to 2006 showed a decrease in the total number of victims but an increase in the total value of identity fraud to US$56.6 billion in 2006. The average fraud per person rose from $5,249 in 2003 to $6,383 in 2006. Recent Surveys and Studies, Privacy Clearing House, retrieved June 30, 2006
Why Do You Care? II • Erratic behavior and can result in system crashes • Work place • Data theft • Transmission of illegal files • Usage of computer/bandwidth of illegal purposes • Erratic behavior and can result in system crashes • Academic dishonesty • Grade changes • Stolen work
How Do You Know if You’re Infected? • New Toolbars in Internet Explorer • Browser crashes unexpectedly • Home page changes • Bandwidth traffic causes internet speeds to decrease • Ads always seem to be similar to your interests • Pages opening as you start up your computer • Pop-ups • “Helpful” programs start up – Bonsi Buddy, CoolWebSearch, Weather Bug • Ctrl-Alt-Delete • msconfig
How to Remove Spyware • Please note: Some programs you install require that you download spyware in order to use them. By removing some spyware, you may be in in violation of licensing agreements for some programs (Morpheus, Sony’s Extended Copy Protection, DivX, AIM)! • Download a free program (see below for recommended programs and cautions) • Buy a program • Run the program often (and at full scanning capabilities) • Usually the combination of several programs is the most effective
Spybot: Search and Destroy • http://www.safer-networking.org/en/index.html • Removes programs based on reported threats Pros • Removes many spyware programs (displayed in red) • Can clean usage tracks (displayed in green) • Can fix registry entries Cons • Requires constant updates • Many features only available through pay-version
Ad-Aware SE Personal • http://www.lavasoftusa.com/software/adaware • Removes spyware and tracking cookies Pros • Easy user interface • Multiple scans for deeper or quicker scans Cons • Time consuming scans • Needs constant updating • Some features not available with shareware version
Spyware Blaster • http://www.javacoolsoftware.com/spywareblaster.html • Works to actively prevent installation of ActiveX-based spyware Pros • Protects without being active in background • Removes tracking cookies in IE Cons • Requires constant updating to remain effective • Only blocks limited programs • Some features not available with shareware version
Hijack This • http://www.trendsecure.com/portal/en-US/threat_analytics/hijackthis.php • Scans Windows OS files to compile a list of items to manually delete – for advanced users Pros • Allows users to post log onto a web forum for “experts” to determine what should be removed • Can find programs that self-replicate Cons • One can delete files essential for their system and cause a system failure • Automated tools for identifying “bad” entries are often not accurate or reliable
Other Programs • Spy Sweeper - http://www.webroot.com/consumer/products/spysweeper/ ($29.95) • Windows Defender - http://www.microsoft.com/athome/security/spyware/software/default.mspx (free) • Trend Micro Anti-spyware - http://us.trendmicro.com/us/home/index.html ($29.95) • Spyware Doctor - http://www.pctools.com/spyware-doctor/ (trial version has limited functionality)
Many programs claim to remove spyware, but are themselves spyware. It is recommended that one downloads a recommended program. errorsafe (AKA system doctor) Pest Trap SpyAxe AntiVirus Gold SpywareStrike Spyware Quake WorldAntiSpy Spylocked SysProtect Spy Sheriff Spy Wiper PAL Spyware Remover PSGuard Malware WinAntiVirus Pro 2006 WinFixer Spydawn ContraVirus A full and updated list (currently 349 programs!) can be found at - http://www.spywarewarrior.com/rogue_anti-spyware.htm Fake: Spyware posing as Anti-Spyware
Bibliography • Image of crowded desktop from http://upload.wikimedia.org/wikipedia/en/5/51/Spyware_infestation.png • Image of spyware pop-up from http://en.wikipedia.org/wiki/Image:Windows_ActiveX_security_warning_%28malware%29.png • “Free Free Free” ad from http://www.velnet.com/pictures/stop_popup_ads.gif • AOL ad from http://www.planetpoint.com/louisacopywriting/lsugar_aol.jpg • Universal Studios ad from http://vil.nai.com/IMAGES/123913_A.GIF • Osama bin Laden ad from http://www.petealbrecht.com/blog/osama.jpg • Popular Mechanics ad from http://static.howstuffworks.com/gif/web-advertising-popup-ad.gif • Israel/Lebanon ad from http://blog.pcformat.co.uk/resources/pcformat/lebanon.png • MSN Today ad from http://www.actsofvolition.com/images/msntoday.gif • Tax relief ad from http://www.taxreliefcoalition.org/docs/Chamber%20Married%20Pop%20Up%20Ad%2003.20.03.jpg • Weather ad from http://vil.nai.com/images/133894_b.GIF • Image of Ad-Aware from http://en.wikipedia.org/wiki/Image:Ad-Aware_Personal.png • Recent Surveys and Studies, Privacy Clearing House, retrieved June 30, 2006