Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
3886063-Spyware

3886063-Spyware

Ratings: (0)|Views: 35|Likes:
Published by venkatesh N

More info:

Published by: venkatesh N on Sep 10, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/11/2014

pdf

text

original

 
Abstract
Over the last several years, a loosely defined collection of computer softwareknown as “
 Spyware
” has become the subject of growing public alarm. Computer usersare increasingly finding programs on their computers that they did not know wereinstalled and that they cannot uninstall, that create privacy problems and open securityholes that can hurt the performance and stability of their systems, and that can lead themto mistakenly believe that these problems are the fault of another application or their  Internet provider. What is even worse, general public is not informed enough on thisissue, companies are still not taking this problem seriously enough, and only few knowhow to fight it. Our presentation mainly aims at answering these questions such as- what is spyware?, how it works?, what is it’s purpose?. We also show you how to detect and  fight spyware? and how to protect yourself from it?
 1
 
SPYWARE
INTRODUCTION:-
In past few years, one of the major threats were surely hackers and computer viruses. Huge efforts were made to fight these problems – it took almost a whole decadeand the problem is still not solved completely. But today we can freely say that viruses donot pose such huge threat as they once did. We learned how to discover them, stop them,and destroy them. Almost every company has Anti-virus systems scanning all incomingand outgoing data; all mail servers are also checking all incoming and outgoingmessages. But, the important fact is that the general public is aware of this threat andeach person possessing a PC knows what has to be done to protect from these threats.Unfortunately, we can’t rest now – new security threats are emerging and eachday more and more analysts warn us thatSpywarewill be the next major security problem in years to come. Over the last several years, a loosely defined collection of computer software known as “spyware” has become the subject of growing public alarm.Basically,Spyware iscomputer softwarethat collects personal information about users without their informed consent.The term, coined in 1995 but not widely used for another  five years, is often used interchangeably withadwareandmalware (software designed to infiltrate and damage a computer respectively).Personal information is secretly recorded with a variety of techniques, includinglogging keystrokes,recording Internet web browsinghistory, and scanning documents on the computer'shard disk . Purposes range from overtly criminal (theft of  passwordsand financial details) to the merely annoying (recording Internet search history for targetedadvertising,while consuming computer resources). Spyware may collect different typesof information. Some variants attempt to track the websites a user visits and then sendthis information to anadvertising agency. More malicious variants attempt to intercept passwords or credit card numbers as a user enters them into aweb formor other applications.
WHAT IS SPYWARE? :-
The term “spyware” has been applied to everything from keystroke loggers,advertising applications that track users’ web browsing, web cookies, to programsdesigned to help provide security patches directly to users. More recently, there has been particular attention paid to a variety of applications that piggyback on peer-to-peer file-sharing softwareand other free downloadsas a way to gain access to people’s computers. Our presentation focuses primarily on these so-called “spyware” and “adware” and other similar applications, which have increasingly been the focus of legislative and regulatory proposals. Many of these applications represent a significant privacy threat.There are at least three general categories of applications that are described asspyware. They are:2
 
• Spyware - key stroke loggers and screen capture utilities, which are installed bya third party to monitor work habits, observe online behavior, or capture passwords and other information.
1
• Adware - applications that install themselves covertly through “drive-bydownloads” or by piggybacking on other applications and track users’ behaviors andtake advantage of their Internet connection.
2
• Legitimate software - legitimate applications that have faulty or weak user-privacy protections. Note that, it is in the first two cases that the spyware label is the most appropriate. In thethird case, it is not.
Spyware
Programs in the first category, which are sometimes called “snoopware”, aretypically stand-alone programs installed intentionally by one user onto a computer used by others. Some capture all keystrokes and record periodic screen shots, while others aremore focused, just grabbing websites visited or suspected passwords. These programshave legal uses (e.g. for certain narrow kinds of employee monitoring) as well as manyclearly illegal ones. The best known spyware programs are Trojans which are mostly used by hackers. They enable them to capture important data from victims’ computer – keystrokes, e-mail addresses, screenshots, passwords, download files. 
Adware
Software in the second category installs itself covertly, generally by piggybackingon another, unrelated application or by deceptive download practices. These programsstart-up on their own and make unauthorized use of users’ computers and Internetconnections, in many cases transmitting information about the user or it’s computer back to a central location. They often resist uninstallation. They usually do not capturekeystrokes or screenshots. In part because applications in this second category fall into alegal grey-zone, they have recently been the focus of a great deal of attention andconcern.
Legitimate software
Legitimate software which includes programs based on legitimate businessmodels that incorporate features with flawed user privacy protections. Generally the problem relates to the unnecessary inclusion or inappropriate use of a unique program ID,which creates the potential for user tracking.Of course, the lines between the three categories we present here can be fuzzy andit is sometimes difficult to tell which group any given application rightfully belongs in.3

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->