Survey of Spyware Tools and Counter Measures



Similar documents
Spyware vs. Anti-Spyware

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Introduction to Computer Security Table of Contents

Spyware. Summary. Overview of Spyware. Who Is Spying?

How Spyware and Anti-Spyware Work

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Countermeasures against Spyware

Section 12 MUST BE COMPLETED BY: 4/22

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Chapter 4 Application, Data and Host Security

Spyware Analysis. Security Event - April 28, 2004 Page 1

BE SAFE ONLINE: Lesson Plan

Airtel PC Secure Trouble Shooting Guide

1 Introduction. Agenda Item: Work Item:

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Spyware Doctor Enterprise Technical Data Sheet

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

By:XÇzA A TÅÅtÜ ]A `t{åééw

extranet.airproducts.com Windows XP Client Configuration

Securing small business. Firewalls Anti-virus Anti-spyware

Computer Viruses: How to Avoid Infection

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Trend Micro OfficeScan Best Practice Guide for Malware

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

McAfee Total Protection Reduce the Complexity of Managing Security

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems

Maintaining, Updating, and Protecting Windows 7

How to easily clean an infected computer (Malware Removal Guide)

Computer Security Maintenance Information and Self-Check Activities

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits.

How To Understand What A Virus Is And How To Protect Yourself From A Virus

Top tips for improved network security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

COMPUTER-INTERNET SECURITY. How am I vulnerable?

ANTIVIRUS AND SECURITY SOFTWARE

Computer Security DD2395

The Care and Feeding of Your Computer Troubleshooting and Maintenance

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Cyber Security: Software Security and Hard Drive Encryption

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director


Copyright Soft Media Publishing

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Laplink PCdefense Reviewer s Guide

Computers and Society: Security and Privacy

Towards a Comprehensive Internet Security Strategy for SMEs

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Computer Networks & Computer Security

Countermeasures against Bots

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Student Tech Security Training. ITS Security Office

Understanding Internet Security. What you need to protect yourself online.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Kaspersky Security 10 for Mobile Implementation Guide

Host-based Intrusion Prevention System (HIPS)

Keystroke Encryption Technology Explained

Hackers: Detection and Prevention

SP0346, LD 1029, item 1, 123rd Maine State Legislature An Act To Create the Maine Spyware Prevention Act

Secure Your Mobile Workplace

Spyware: Securing gateway and endpoint against data theft

my.airproducts.com Windows Vista Client Configuration

Infocomm Sec rity is incomplete without U Be aware,

Cox Business Premium Security Service FAQs

User Guide for the Identity Shield

How not to lose your computer or your research. M.R. Muralidharan SERC IISc

Cyber Security Response to Physical Security Breaches

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft

Spyware: Causes, Effects and Prevention

Kaspersky Internet Security

Types of cyber-attacks. And how to prevent them

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

ESET NOD32 Antivirus. Table of contents

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Information Technology

1 Introduction. Agenda Item: Work Item:

Contents. McAfee Internet Security 3

Payment Fraud and Risk Management

Course Content: Session 1. Ethics & Hacking

System Administrator Guide

Mobile Devices and Malicious Code Attack Prevention

Endpoint Security Management

How are we keeping Hackers away from our UCD networks and computer systems?

Information Security Training on Malware

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Transcription:

Survey of Spyware Tools and Counter Measures Dr. Robert W. Baldwin Plus Five Consulting, Inc. Kevin W. Kingdon Intellitrove, Inc.

Outline Spyware Demonstration Spyware: Architecture & Features Ethics Counter Measures: Standard & Specific Future of Spyware & Counter Measures

Demonstration One of the Better Spyware Programs

Outline Spyware Demonstration Spyware: Architecture & Features Ethics Counter Measures: Standard & Specific Future of Spyware & Counter Measures

Spyware Feature Discussion Windows Has Built-In Logs for Spying Spyware Log Files are Very Sensitive Spyware Trumps Encryption PGP Password Grabber Reporting Via Piggy-Back Email is Very Hard to Detect Smart Card May Not Help Spyware Observes Decrypted Contents of Files Trojan Software Can Query Smart Card (Future) Log Analysis Is Time Consuming

Malicious Software Taxonomy Dangerous Spyware Viruses & Worms Pop-Ups Ad-Ware Harmless History & Logs Cookies Parental Controls Monitor Modify

Spyware Logical Scope Word Chat Email Web Net Meeting Application Launch, Network Connections Screenshots, Keystrokes, File Access Microphone, Modem (Voice!), Camera

Spyware System Architecture Target Firewall Internet File or Mail Server Spy Inside Spy Outside

KeyKatcher - PS/2 Inline - 64-256 Kbytes - Password - TTY Dump - Limited Search High-End Built Into Brand Name Keyboards Spyware Hardware

Spyware Hardware Scope

Outline Spyware Demonstration Spyware: Architecture & Features Ethics Counter Measures: Standard & Specific Future of Spyware & Counter Measures

Spyware Ethics

Spyware Ethics Within 36 hours I had enough evidence to approach the police and the man was arrested One of the BEST investments I EVER made. I found all 17 of his girlfriends Thank you for saving me from marrying this undeserving person. Now that I know about my boss layoff plans, I m updating my resume.

Spyware Ethics Legitimate Protect & Educate Children Dubious Spy on Spouse Criminal Steal Credit Card Numbers Mitigate Corporate Liability Spy on Boss Steal Trade Secrets Gather Evidence for Police Spy on Dissidents, Fish for Criminals Steal National Secrets

Outline Spyware Demonstration Spyware: Architecture & Features Ethics Counter Measures: Standard & Specific Future of Spyware & Counter Measures

Counter Measures Architecture Target Firewall Internet File or Mail Server Spy Inside Spy Outside

CM: Existing Windows Features Scan for Unsigned System Files Scan for Newly Created Files Task Manager Reports Some Spyware MS Configuration Manager Reports Some Spyware Startup Items Disk & Network I/O Performance Monitors or LEDs Reflect Some Spyware Activity

CM: Standard Security Products Network and Personal Firewalls Block Installation and Reporting Can Detect Spyware Activity Central Email Virus & Executable Blocker Helps Thwart Remote Installation Personal Email Scanner Helps Block Installation and Reporting

CM: Ineffective Products Anti Virus Scanners Norton, McAfee, Trend Micro Websites State: They Will Not Detect Spyware; Monitoring Software Is Not Malicious Ad-Ware Scanners Don t Target Keystroke Loggers, Etc. Ad-Ware and Pop-Up Blockers Only Examine Browser-Related Activity

CM: Specific Tools Anti-Spyware Websites & Newsletters www.keylogger.org, www.spywareinfo.com Window Washer, SpyBot & Others Remove Information Examined by Spyware SpyBot, SpyCop, and Many More Like Early Virus Scanners: Signature Based Scan for Active Program Files & Installer Files Scan for Registry Entries, Directories

CM: Specific Tools: SpyBot

CM: Specific Tool: SpyCop

Counter Measures Discussion Free & Commercial Tools Very Effective Against Commercial Spyware Program Quality & Usability Varies Keeping Up With Spyware Signatures No Toolkits for Making Spyware (So Far!) Manual Scanning is the Norm Future: Real Time Scanning with Automatic Removal or Quarantine

CM: Discussion Software Countermeasures Do NOT Work Against Spy Hardware When Boss Spills Coffee on Your Keyboard The Paranoid Need Both! Spyware as Intrusion Detection Tool Spyware to Detect Spyware Installation

Outline Spyware Demonstration Spyware: Architecture & Features Ethics Counter Measures: Standard & Specific Future of Spyware & Counter Measures

Future of Black Hat Spyware Spyware as Stepping Stone For Big Attack Place Backdoor in MS Office Source Code Virus Writers Building Black Hat Spyware Spyware Building Kits Harder to Detect & Remove Windows is Big Attractive Target Anti-Anti Spyware (That Works) There Are Viruses That Disable ZoneAlarm More Recording of Phone, Fax, Copier, Printouts, Microphone & WebCam

Future of White Hat Spyware Private & Government Investigators Enterprise Features Central Installation, Control, Upgrade Eliminate Black Hat Features Better Analysis Tools Adaptive Logging And Reporting Details Merge With Network Monitoring

Future of Counter Measures Fear of Lawsuits Keep Anti-Virus Vendors Out Spyware Detection Based on Behavior Not Just Name & Content Signatures Running All The Time; Check Downloads IT Approved Signed Executables Need Foundation For Better Anti-Spyware Palladium & Phoenix StrongROM Rediscover the Trusted Systems Technologies from 1980s

Questions? More Information At: www.plusfive.com www.intellitrove.com