• No results found

Understanding Spyware

N/A
N/A
Protected

Academic year: 2021

Share "Understanding Spyware"

Copied!
27
0
0

Loading.... (view fulltext now)

Full text

(1)

Understanding Spyware

GOH Seow Hiong

Director, Software Policy (Asia)

Business Software Alliance

September 2005

APECTEL WG Meeting 2005 Seoul, Korea

(2)

Outline

About BSA

The Cyber Landscape of Today

What is Spyware?

The Spyware Challenge

(3)

About BSA

Outline •About BSA

•The Cyber Landscape of Today

•What is Spyware?

•The Spyware Challenge

•Combating Cyber Threats

APECTEL WG Meeting 2005 Seoul, Korea

(4)
(5)

Our View

Target criminals, not technology

BSA supports legislation that criminalizes rogue

activities, rather than the technology itself

Targeting technology might lead to the stifling

legitimate online services and future innovations

(6)

The Cyber Landscape of Today

Outline •About BSA

•The Cyber Landscape of Today

•What is Spyware?

•The Spyware Challenge

•Combating Cyber Threats

APECTEL WG Meeting 2005 Seoul, Korea

(7)

Cyber Landscape

Global networks of connected

computers

Communication & Collaboration

New environment of organized crime

of fraud, theft and extortion

Cyber Security vital to secure systems,

protect computers and sensitive

(8)

Cyber Threats

Spyware & Adware **

Phishing (website spoofing) and Pharming

Trojans (program that masks malicious

purpose)

Worms and Viruses

Cross Site Scripting

Rootkits

(9)

What is Spyware?

Outline •About BSA

•The Cyber Landscape of Today

•What is Spyware?

•The Spyware Challenge

•Combating Cyber Threats

APECTEL WG Meeting 2005 Seoul, Korea

(10)

Spyware

Tracking Software deployed without adequate notice,

consent and control for the user

‘Infection’ occurs when user clicks a button on a

dialogue box and is directed to a rogue website

• Changes registry key and browser settings

Potentially sends out information to other sites for

tracking purposes

• Monitors user’s browsing habits

• Records keystrokes

• Performs screen captures in real-time

• Information sent to third party with malicious intent

(11)

The Fine Line with Adware

A type of Advertising Software

• Applications that deliver advertising in a manner or context unexpected and unwanted by users

Pop-up ads sent to user based on web surfing

habits

• Pop-up windows or through a bar that appears on the computer screen

Helps recover programming development

cost and helps hold down cost for the user

(12)

Adware / Spyware

When searching for a flight at a airline website, adware pops-up an ad

(Expedia) which nearly completely covers the requested website (Delta)

A typical user experience with competing adware programs installed, often through software bundles– this has led at least one

(13)

The Spyware Challenge

Outline •About BSA

•The Cyber Landscape of Today

•What is Spyware?

•The Spyware Challenge

•Combating Cyber Threats

APECTEL WG Meeting 2005 Seoul, Korea

(14)

How does Spyware intrude?

Shipped with other applications

Clicking on links or attachments in

email messages, or via “chat”

programs

Unknowingly downloaded from a web

site via exploits

Carried as part of malicious code –

(15)

Where does Adware come from?

Usually bundled and installed with

“free” applications

Consumer receives series of applications, including

new icons for other services on desktop

Installed at websites targeting young audiences

Installed through web browser “drive-bys” or trick

pop-ups

(16)

Targeting Young Audiences

1.

At “website for kids”, free smiley icons are offered to children for download

2.

The install has a broken link leading to the EULA and lacks a “cancel” button during

(17)

3.

The program embeds itself into Internet Explorer, Windows

Explorer and Outlook– substantially hindering performance

4.

Further unexpected

behavior is the placement of 2 new icons and the

appearance of a new toolbar not only above but also on the

(18)

Installed through browers by trickery

1.

Consumer visiting wrestling website automatically prompted to accept “free browser enhancements”

2.

Clicking yes installs 2 new toolbars in their web browser and places 6

(19)

Other Tactics

Instead of stating a company name, this publisher urges you

to “Click Yes” to continue.

This may look like a Windows dialog box, bit it is an

advertisement. Even if hit “Cancel”, it will proceed. Click the

(20)

Anti-Spyware Software

Identifies, prevents and safely

eliminates potentially unwanted

programs

Including spyware, adware, pop-ups, dialers,

keyloggers and remote-control programs

Provided for free by Internet Service

Providers (ISPs) or bundled with

software

(21)

Combating Cyber Threats

Outline •About BSA

•The Cyber Landscape of Today

•What is Spyware?

•The Spyware Challenge

•Combating Cyber Threats

APECTEL WG Meeting 2005 Seoul, Korea

(22)

Target Criminals, Not Technology

Legislate to criminalize illicit activities

that use technology

Avoid targeting the technology that

facilitates

So as not to stifle legitimate online services and

future innovations

(23)

Law Enforcement Funding

Enforcement authorities

Ensure sufficient funding and

resources

To keep pace with criminal counterparts

Adequately sized team, with technical training and

equipment for investigation, forensics, etc.

(24)

Penalties

Increase penalties to deter illegal activity

• Fraud, theft and extortion

Punish worst offenders and discourage

future acts

Penalties

• Typical ones are fine and imprisonment

• Making penalties commensurate with crime

• Potential difficulty in assessing damages and imposing appropriate penalty

(25)

Market Solutions

Private sector solutions

Play important part in an effective overall spyware

protection regime and defense against cyber threats

Understand scope and capability of available tools

National policies should build upon and

encourage the market-driven framework

that is already in place

(26)

CONCLUSION

Importance of ensuring a free flow

across networks

Ideas, information, communication and commerce

Maximize online trust

Through adoption and deployment of

trust-enabling technologies, as well as implementation

of policies

(27)

THANK YOU

Questions? Comments? Clarifications?

GOH Seow Hiong

Email: shgoh@bsa.org

APECTEL WG Meeting 2005 Seoul, Korea

References

Related documents

Proposal by the NCEA to Board of Cosmetology Florida Board of Cosmetology is reviewing the NCEA 600 Hour Esthetician Job Task Analysis in consideration of rais- ing the level

You might be taken to a Spyware-embedded site by clicking a link provided in an email message or on the electronic bulletin board. So you must be careful not to click

It is the common talk here among Spaniards and friars who came from there that the Filipino woman is weak and ignorant, as if all were weak because some have fallen; as if in

Best Practices for Securing Mobile Systems and Data Protecting Against Hackers and Network Threats.. The best practices for protecting against hackers, viruses, spyware and

The site selected was nearby the Bandaraya Ipoh, Perak biggest city suite to propose a brand cafe. That it because it situated at the center of Ipoh

The findings show that the three (3) variable customers perceived quality and expectations, customer trust and willingness and insurer commitments were important in

And in the overall       enjoyment category, which I argue is the most important, there is a statistically       significant difference in favor of people who went out of their way

Association-MGMA in 2000. She instructs on how accurate coding and complete documentation connects to optimal reimbursement, following guidelines and meeting compliance regulations in