Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Spyware is one type of malicious software (malware) that collects information from a computing system without your consent. Spyware can capture keystrokes, screenshots, authentication credentials, personal email addresses, internet usage habits, and other personal information. Often, the data is delivered to online attackers who sell it to others or use it themselves to execute financial crimes, identity theft, or use it for marketing or spam. Spyware tracks online activity looking for web sites visited, financial data or identity data such as credit card numbers entered into fields, browsing and online purchasing habits, and authentication credentials. When keywords of interest like names of banks, online payment systems or pornographic web sites are observed, the spyware starts its data collection process. Spyware: Who is Spying Provided by: Warren County Information Technology Department 301 N Buxton St Indianola, IA 50125 Phone: 515-961-1166 www.co.warren.ia.us Who Is Spying? How Spyware Operates Safe Practices The people who use spyware include • online attackers • marketing organizations • organized crime • trusted insiders • Government sponsored espionage • Corporate sponsored espionage Email Addresses Email addresses can be used from an infected computer and marketed for use in spam mailing lists. • • • The Keys You Press Key logging is one of the first spyware techniques used. Both hardware and software key loggers exist. Software key loggers capture keyboard events and record the keystroke data before it is sent to the intended application for processing. Many keyloggers target Instant Messaging clients, email applications, and web browsers but might ignore other applications that don’t provide the kind of data the attacker is targeting for harvest. • Network Traffic Network traffic is another valuable source of data. Some data commonly extracted include user names, passwords, email messages, and web content. • Online Attackers Online attackers primary interest in spyware is using it to steal personal information for financial crimes such as illicit trafficking in stolen credit card and credit card information. Marketing Organizations Marketing organizations are interested in personal information such as email addresses, online shopping and browsing habits that can be used to execute marketing campaigns like spam, spim (unsolicited messages received via instant messaging systems), browser popups, home page hijacking (changing the default web address for a user’s browser), and more. Spying by a Trusted Insider A trusted insider might be an employee who uses spyware to collect business information which can be sold or used to gain access to more valuable information at some later time. Frequently, attackers and their malware impersonate associates of the target user to coax them into installing the malicious code. A common example of this is when malware infects a system and then automatically emails itself to everyone in the infected persons’ address book. When such an email is received, the recipient is more likely to open the contents because the sender may be a familiar, trusted source. • • • • • Assign a complex password to your computer. Pause before you open attachments/links. Press ALT-F4 to close a popup or click on the “X”. Clicking on “No” or “Cancel” sometimes installs spyware. Beware of visiting untrusted web pages. Download from reputable sites. Install software to detect spyware/adware and set it for regular, automatic updates. Share files only with people you trust. Pay attention when installing applications, you may actually be agreeing to the install of spyware/adware that are not desired. Do not install free utilities on your computer. They can come with adware/spyware and bring your computer to a grinding halt. Keep your operating system and software current with updates and patches. If you are running Windows XP, install Service Pack 2. Symptoms of a Compromised Computer • • • • • • • Slow or non-responsive? Running programs that you weren't expecting? Showing signs of high level of activity to the hard drive that is not the result of anything you initiated? Running out of disk space unexpectedly? Unable to run a program because you don’t have enough memory? Program constantly crashing? Rejecting a valid and correctly entered password?