Anda di halaman 1dari 22

INTRODUCTION TO SPYWARES

&DETECTION ESCAPISM,WORKING OF
ANTISPYWARE
Cyber Security Assignment
By:-
18E011 18E016
18E012 18E017
18E013 18E018
18E014 18E019
18E015 18E020

Guided by:- Prof. Usha Patel


Spyware
 The word 'spyware' was used for the first time
publicly in October 1995.
 It popped up on Usenet (a distributed Internet
discussion system in which users post e-mail like
messages) in an article aimed at Microsoft's
business model.
What is Spyware ?
 Spyware refers to programs that use your Internet
connection to send information from your
personal computer to some other computer,
normally without your knowledge or permission.

 This
information is a record of your ongoing
browsing habits, downloads, or it could be more
personal data like your name and address.
How Spyware Invades your PC

 Most spyware is installed without users'


knowledge.
 Spyware gets on a system through
deception of the user or through
exploitation of software vulnerabilities.
 Most of the time it is bundled with some
sort of other software that the user has
downloaded.
Examples of Spywares
 Cool Web Search
 Internet Optimizer
 HuntBar
 Movieland
 MyWebSearch
 Zango
 WeatherStudio
Effects and Behaviours
A spyware infestation can create significant
unwanted CPU activity, disk usage, and
network traffic.
 Stability issues, such as applications
freezing, failure to boot, and system-wide
crashes, are also common.
 Spyware, which interferes with networking
software commonly causes difficulty
connecting to the Internet.
TYPES
 Some types of spyware disable software
firewalls and anti-virus software, and/or
reduce browser security settings, thus
opening the system to further opportunistic
infections, much like an immune deficiency
disease.
 Some other types of spyware use rootkit
like techniques to prevent detection.
Remedies and Prevention
 Spyware is still changing, meaning remedies
can vary from different types of spyware.
 If programs do not work to rid the computer
of the infected then a full system reinstall
would be needed.
 Most big anti-virus firms have added
antispyware to their anti-virus packages.
(Such as Macafee and Symantec)
Video on Spyware
Detection Escapism
 One of the most insidious kinds of
spyware is polymorphic spyware,
which uses a variety of tactics to
evade detection and removal,
including the ability to constantly
change its filename and location.
Detection Escapism
 When a piece of anti-spyware detects
and kills the files in one of the
locations, the spyware spawns a new
copy of itself at another location and
runs from there.
Detection Escapism
 Insome instances, the spyware can
inject itself into a process running on
PC. When the main spyware program
is deleted, the copy that has injected
itself into a process spawns another
copy of itself.
Detection Escapism
 Some of the spyware runs silently in the background,
doing no damage. However, it spawns a program that
does the actual damage. Anti-spyware detects the
program doing the damage but not the silent spyware.
The silent spyware that spawns a new destructive
program, with a different filename and different size
so it is not recognizable.
Detection Escapism
 Some spyware hides itself into your
computer’s Registry, which contains basic
instructions for how your computer
should work .It is able to hide those
entries - not only from anti-spyware
programs, but also from Registry editors
that can normally see everything in the
Registry. In this way, it cannot be seen or
detected.
Anti-Spywares
Working of Anti-Spywares
 Anti spyware scans a system in search of bits of code called
signatures that are telltale signs of a spyware infection.
 When the anti-spyware finds what it believes is a signature, it
compares it to its database of Signatures, called the signature
base. If it finds a match , it knows there is a spyware
infection.
 New Spyware is being released all the time, and existing
spyware is often updated. To ensure that it can catch all the
latest infections ,anti-spyware regularly downloads the
latest,updated signatures.
Working of Anti-Spywares
 When it identifies a piece of spyware ,it deletes it .Deleting
spyware can be a complex task, requiring the deletion of many
files in many directories , making changes to the registry, and
so on.
 Because of that, not all anti spyware can delete all the
spyware it finds. In some instances, you need to download a
specific program to kill a specific piece of spyware.
 Anti spyware also includes real time protection. It sits in the
memory and watches for signs that spyware is being installed to
the PC or that home page of search page is being hijacked. It
won't allow the spyware to be installed on the hijacking to take
place.
Anti-spyware
Protection
 1. They can provide real time
protection against the
installation of spyware software
on your computer.
 2. Anti-spyware software
programs can be used solely for
detection and removal of
spyware software that has
already been installed onto your
computer.
Examples of Anti-Spyware

Ad-Aware SE
 Spybot - Search & Destroy
 GIANT AntiSpyWare
AVG Anti-Spyware Professional
Edition
Thank You

Anda mungkin juga menyukai