SlideShare a Scribd company logo
Online spying tools
Online spying tools
Online spying tools
COMPUTER SECURITY:
Computer Security is the protection of computing system & the
data that they store access.
 IMPORTANCE:
1. Computer security supporting critical business process,
2. Computer security protecting personal and sensitive information
3. Computer security enabling people to carry out their jobs ,
education & research
 A threat is anything that can cause harm. In
the context of computer security, a threat can
be a burglar, virus, an earth quake, or a
simple user error
 EXAMPLES:
The threats you face :
VIRUSES:
1. Damage worth f1.8bn in 12 days on the
internet in 2003.
 VIRUS BACK DOOR:
1. Hidden after effects with potentially impact
 DEF:
It is defined as injuries
,suffering, disability or death.
EXAMPLE:
There is probably no threats
flooding . If u don’t use anti-
virus software ,however there is
a very good chance that your
computer will become infected
 A countermeasure is any step you take to
ward off a threat to protect yourself, your
data , or computer from harm.
CLASSES:
1. The first shield the user from personal harm
, such as threats to personal property
2. The second safeguard protects the
computer system from physical hazards
such as power problems
 Computer use can cause physical injuries to
the user.
 Prolonged mouse & keyboard use, staring at
a monitor for too long, & poor seating
condition are the primary causes of such
injuries.
 In this topic we will discuss about the threats
which user face.
These are:
 IDENTITY THEFT
 LOSS OF PRIVACY
 PUBLIC RECORDS ON THE INTERNET
 The fraudulent practice of using
another persons name & personal
information in order to obtain its
personal documents or credits etc.
e.g.
 With the right information an identity
thief can virtually become the victim,
obtaining a drivers license , bank
accounts & other items in the
victims name.
 Identity thieves can use several methods
low-tech as well as high-tech to obtain the
information they need.
1. Shoulder Surfing
2. Snagging
3. Dumpster Diving
4. Social Engineering
Online spying tools
EXAMPLE:
Someone might shoulder surf when
you are
Entering your computer password ,
ATM pin
Or credit card number.
Criminals often use this technique to
gain access to your personal
accounts or to read personal
information , such as e-mails .
 To prevent shoulder surfing ,experts
recommend that you shield your paper work
and your keyboard from view of others while
filling some type of form or typing your PIN
or passwords.
Online spying tools
Online spying tools
 In general, dumpster diving
involves searching through trash
or garbage looking for
something useful.
 In IT world , DUMPSTER
DIVING is a security attack
which involves going through
materials or files that have been
thrown into the RECYCLE BIN.
Information stolen
by thieves :
Possible issues
resulting from
stolen info- :
Dumpster diving
stats:
•Identity theft •Americans receive
over 4 million tons of
junk mail each year.
•Street address •Loan fraud
•Phone number •Benefits fraud •Identity theft victims
claim that 88% of
the stolen
information thieves
obtained by D.D
•Email address •Employment related
fraud
•Bank account •Bank fraud
 -Never discard documents containing
information such as a Social Security number,
driver's license number, or bank account
number into a public trash bin.
 • -Always shred important
documents you choose to discard.
 • -Thoroughly cut up all old credit
and debit cards so that the information is not
legible .
 DEF:
 An art of deceiving
people.
 It is an effective
technique which thief
uses to obtain someone’s
personal information
under the pretext of
something legitimate.
 EXAMPLE:
Claim to be a system administrator at the
website of the victims bank ; and ask for the
victim’s user ID and password for a system
check.
With this information thief can go online and
access the victim’s account information
directly through bank website.
Online spying tools
Privacy can be lost through
many ways .
like
Whenever you use “store loyalty
” card to buy groceries , the
purchases are logged in
database.
As it is your medical ,financial
and credit records are
available to anybody who
authorize to view them.
e.g.
 Many insurance companies maintain data
bases filled with info- about you . You might
expect these firms to know your name &
address , but you might be surprised to know
that , they know how many times each month
you put gas in your car or buy a magazine .
A lot of companies do not keep this info-
confidential , they may sell it to other companies
who are interested in knowing about you.
 Your personal info- is available to anybody
who has the few dollars to buy it from
commercial public record services .
 Some companies will give you detailed
reports about most people .
 These reports include info- such as :
 Background information
 Criminal records etc
 It includes marriage, divorce ,adoption ,
driving , credit history & bankruptcies records
.
AND along with many other legal records , are
available to anybody who wants to view them.
There are no. of companies that collect public
records , package them and sell them to
anyone who wishes to purchase.
 Criminal records include:
 federal crimes(like bank fraud , bribery ,
hacking etc)
 Felony crimes(like robbery , escaping from
prison , murder , kidnapping etc )
 Misdemeanor crimes(like vandalism ,
trespassing , petty theft etc)
ETC. These type of records are available on
internet. Any one can buy this information
through commercial public record sources.
 Software developers
have created many ways
to track your activities
online.
 These tools were created
for benign purposes, now
they are also being used
in ways most consumers
do not appreciate
1. COOKIES
2. WEB BUGS
3. SPYWARE
4. SPAM
Online spying tools
 It is a small text file that a web server asks your
browser to place on your computer.
 It contains info- that identifies your computer
e.g.
 your IP Address
 Your User name or E-mail address & info-
about your visit to the web site.
 Your last time visit to site , which pages you
visit, which downlaod & how long you were
at the site.
Online spying tools
Online spying tools
 Each browser has its own set of cookies .
 Each website can read only its own cookies .
 Size=4096 bytes or 4KB .
 20 cookies per site , allow by browser .
 Per browser allow 300 cookies , if more
cookies are created an old cookie will be
deleted .
 When it created an expiry time is also
provided :
1. Deleted if the expiry time has passed .
2. Depend on server .
3. If no time is given, cookies are deleted as
the browser window is closed .
4. Depend on user .
 Despite their helpful purposes there are
threats to privacy .
 They can be used to store & report
many types of information & these info-
can be used against your wishes.
e.g.
 The cookies maker might use the cookie to
determine what kind of advertisement will
appear on your screen the next time you visit
web site
 All the info- that cookie stores can be used
against your wishes.
 Your PC may be storing hundreds or
thousands of cookies , many of them you
don’t want to keep them on your system,
FOLLOWING TOOLS
1. REAL CLEAR COOKIES
2. SUPER CLEAR COOKIES
 A small GIF-format
(graphics interchange
format) image file that can
be embedded in a Web
page.
 A web bug can be as
small as a single pixel that
can be easily hidden.
• A web bug is an object
embedded in a web page or
email, which ,(usually invisibly)
allows checking that a user has
accessed the content
• Behind the tiny image ,however
the lies code that allowing the
bug’s creator to track many of
your online activities.
• It can record pages you view,
keyword, personal info- & other
data.
 A number of anti-web
bugs now exist. To
remove anti web-
bugs , one of the
following is :
1. HOPE ANTI
ROOTKIT
HIJACKERS WEB
BUG
 Internet advertising is a
common source of spyware.
 It is used to refer to many
different kinds of software that
can track a computer user’s
activities & report them to the
someone else.
 e.g.
 You install and register a program it may ask
u to fill out a form. These info- sends to the
developer, who stores it in database.
 In this manner they are seen as perfectly
because the user is aware about this
information.
 More commonly, spyware is
installed on a computer without
user’s knowledge & collects the
info-.
 It can land on your pc from Web-
pages , E-mail messages.
 Spyware can track virtually
anything you do & secretly report
these activities to someone else.
 To secure your PC from spyware , spyware-
killing products are following:
1. SPYWARE TERMINATOR
2. COUNTER SPY
3. MALWARE BYTES
 The availability of your private info- might be
troubling , the consequence for the most
users is called spam or (Internet “JUNK
MAIL”).
 The correct term for spam is unsolicited
commercial E-mail(UCE) .
 UCE: is a legal term used to describe an
electronic promotional message sent to
consumer without the request or consent.
 People who sent out these endless streams
of spam , (spammers) get e-mail addresses
in following ways :
1. Purchasing e-mail address from brokers .
2. “Harvesting” e-mail address from Internet.
3. Generating random strings of characters in
an attempt to match legitimate address.
1. SPAM FIGHTER
2. CA ANTI SPAM SOFTWARE
3. CLOUD MARK DESKTOP
 Threats to your computer’s hardware
involves incidents that have an effect on the
operation or maintenance of the computer
 It affect computer in two
ways:-
1. Power fluctuations , when
the strength of your
electrical service rises or
falls , can cause
component failures
2. Power failure , when
power is lost altogether ,
cause systems to shut
down.
 YOU CAN EQUIP YOUR SYSTEM WITH
ONE OF THE FOLLOWING DEVICES:
 Protect against voltage spikes, these
inexpensive plugs can be bought in most
hardware stores.
 Protect additional functions . They are
safeguard against line noise .
 They are essentially a
battery backup for your
computer .
 Protect system from
electrical events including
a total loss of power .
 A vandal can do
tremendous damage to a
computer , resulting in total
loss of the system & the
data it stores .
 Special locks are available
that can attach a system
unit , monitor , or other
equipment to a desk ,
making it very difficult to
move
 Disaster planning addresses natural &
man-made disasters . It is not called
“disaster prevention” because things
like earth-quakes & hurricanes are
hard to predict & impossible to prevent.
1. Be aware that a disaster could strike &
anticipate .
 when conditions are right ;
e.g.
 If you live on the East Coast of the United
States , you know when to anticipate a
hurricane .

More Related Content

Online spying tools

  • 4. COMPUTER SECURITY: Computer Security is the protection of computing system & the data that they store access.  IMPORTANCE: 1. Computer security supporting critical business process, 2. Computer security protecting personal and sensitive information 3. Computer security enabling people to carry out their jobs , education & research
  • 5.  A threat is anything that can cause harm. In the context of computer security, a threat can be a burglar, virus, an earth quake, or a simple user error  EXAMPLES: The threats you face : VIRUSES: 1. Damage worth f1.8bn in 12 days on the internet in 2003.
  • 6.  VIRUS BACK DOOR: 1. Hidden after effects with potentially impact
  • 7.  DEF: It is defined as injuries ,suffering, disability or death. EXAMPLE: There is probably no threats flooding . If u don’t use anti- virus software ,however there is a very good chance that your computer will become infected
  • 8.  A countermeasure is any step you take to ward off a threat to protect yourself, your data , or computer from harm. CLASSES: 1. The first shield the user from personal harm , such as threats to personal property 2. The second safeguard protects the computer system from physical hazards such as power problems
  • 9.  Computer use can cause physical injuries to the user.  Prolonged mouse & keyboard use, staring at a monitor for too long, & poor seating condition are the primary causes of such injuries.
  • 10.  In this topic we will discuss about the threats which user face. These are:  IDENTITY THEFT  LOSS OF PRIVACY  PUBLIC RECORDS ON THE INTERNET
  • 11.  The fraudulent practice of using another persons name & personal information in order to obtain its personal documents or credits etc. e.g.  With the right information an identity thief can virtually become the victim, obtaining a drivers license , bank accounts & other items in the victims name.
  • 12.  Identity thieves can use several methods low-tech as well as high-tech to obtain the information they need. 1. Shoulder Surfing 2. Snagging 3. Dumpster Diving 4. Social Engineering
  • 14. EXAMPLE: Someone might shoulder surf when you are Entering your computer password , ATM pin Or credit card number. Criminals often use this technique to gain access to your personal accounts or to read personal information , such as e-mails .
  • 15.  To prevent shoulder surfing ,experts recommend that you shield your paper work and your keyboard from view of others while filling some type of form or typing your PIN or passwords.
  • 18.  In general, dumpster diving involves searching through trash or garbage looking for something useful.  In IT world , DUMPSTER DIVING is a security attack which involves going through materials or files that have been thrown into the RECYCLE BIN.
  • 19. Information stolen by thieves : Possible issues resulting from stolen info- : Dumpster diving stats: •Identity theft •Americans receive over 4 million tons of junk mail each year. •Street address •Loan fraud •Phone number •Benefits fraud •Identity theft victims claim that 88% of the stolen information thieves obtained by D.D •Email address •Employment related fraud •Bank account •Bank fraud
  • 20.  -Never discard documents containing information such as a Social Security number, driver's license number, or bank account number into a public trash bin.  • -Always shred important documents you choose to discard.  • -Thoroughly cut up all old credit and debit cards so that the information is not legible .
  • 21.  DEF:  An art of deceiving people.  It is an effective technique which thief uses to obtain someone’s personal information under the pretext of something legitimate.
  • 22.  EXAMPLE: Claim to be a system administrator at the website of the victims bank ; and ask for the victim’s user ID and password for a system check. With this information thief can go online and access the victim’s account information directly through bank website.
  • 24. Privacy can be lost through many ways . like Whenever you use “store loyalty ” card to buy groceries , the purchases are logged in database. As it is your medical ,financial and credit records are available to anybody who authorize to view them.
  • 25. e.g.  Many insurance companies maintain data bases filled with info- about you . You might expect these firms to know your name & address , but you might be surprised to know that , they know how many times each month you put gas in your car or buy a magazine . A lot of companies do not keep this info- confidential , they may sell it to other companies who are interested in knowing about you.
  • 26.  Your personal info- is available to anybody who has the few dollars to buy it from commercial public record services .  Some companies will give you detailed reports about most people .  These reports include info- such as :  Background information  Criminal records etc
  • 27.  It includes marriage, divorce ,adoption , driving , credit history & bankruptcies records . AND along with many other legal records , are available to anybody who wants to view them. There are no. of companies that collect public records , package them and sell them to anyone who wishes to purchase.
  • 28.  Criminal records include:  federal crimes(like bank fraud , bribery , hacking etc)  Felony crimes(like robbery , escaping from prison , murder , kidnapping etc )  Misdemeanor crimes(like vandalism , trespassing , petty theft etc) ETC. These type of records are available on internet. Any one can buy this information through commercial public record sources.
  • 29.  Software developers have created many ways to track your activities online.  These tools were created for benign purposes, now they are also being used in ways most consumers do not appreciate
  • 30. 1. COOKIES 2. WEB BUGS 3. SPYWARE 4. SPAM
  • 32.  It is a small text file that a web server asks your browser to place on your computer.  It contains info- that identifies your computer
  • 33. e.g.  your IP Address  Your User name or E-mail address & info- about your visit to the web site.  Your last time visit to site , which pages you visit, which downlaod & how long you were at the site.
  • 36.  Each browser has its own set of cookies .  Each website can read only its own cookies .  Size=4096 bytes or 4KB .  20 cookies per site , allow by browser .  Per browser allow 300 cookies , if more cookies are created an old cookie will be deleted .
  • 37.  When it created an expiry time is also provided : 1. Deleted if the expiry time has passed . 2. Depend on server . 3. If no time is given, cookies are deleted as the browser window is closed . 4. Depend on user .
  • 38.  Despite their helpful purposes there are threats to privacy .  They can be used to store & report many types of information & these info- can be used against your wishes.
  • 39. e.g.  The cookies maker might use the cookie to determine what kind of advertisement will appear on your screen the next time you visit web site  All the info- that cookie stores can be used against your wishes.  Your PC may be storing hundreds or thousands of cookies , many of them you don’t want to keep them on your system,
  • 40. FOLLOWING TOOLS 1. REAL CLEAR COOKIES 2. SUPER CLEAR COOKIES
  • 41.  A small GIF-format (graphics interchange format) image file that can be embedded in a Web page.  A web bug can be as small as a single pixel that can be easily hidden.
  • 42. • A web bug is an object embedded in a web page or email, which ,(usually invisibly) allows checking that a user has accessed the content • Behind the tiny image ,however the lies code that allowing the bug’s creator to track many of your online activities. • It can record pages you view, keyword, personal info- & other data.
  • 43.  A number of anti-web bugs now exist. To remove anti web- bugs , one of the following is : 1. HOPE ANTI ROOTKIT HIJACKERS WEB BUG
  • 44.  Internet advertising is a common source of spyware.  It is used to refer to many different kinds of software that can track a computer user’s activities & report them to the someone else.
  • 45.  e.g.  You install and register a program it may ask u to fill out a form. These info- sends to the developer, who stores it in database.  In this manner they are seen as perfectly because the user is aware about this information.
  • 46.  More commonly, spyware is installed on a computer without user’s knowledge & collects the info-.  It can land on your pc from Web- pages , E-mail messages.  Spyware can track virtually anything you do & secretly report these activities to someone else.
  • 47.  To secure your PC from spyware , spyware- killing products are following: 1. SPYWARE TERMINATOR 2. COUNTER SPY 3. MALWARE BYTES
  • 48.  The availability of your private info- might be troubling , the consequence for the most users is called spam or (Internet “JUNK MAIL”).  The correct term for spam is unsolicited commercial E-mail(UCE) .  UCE: is a legal term used to describe an electronic promotional message sent to consumer without the request or consent.
  • 49.  People who sent out these endless streams of spam , (spammers) get e-mail addresses in following ways : 1. Purchasing e-mail address from brokers . 2. “Harvesting” e-mail address from Internet. 3. Generating random strings of characters in an attempt to match legitimate address.
  • 50. 1. SPAM FIGHTER 2. CA ANTI SPAM SOFTWARE 3. CLOUD MARK DESKTOP
  • 51.  Threats to your computer’s hardware involves incidents that have an effect on the operation or maintenance of the computer
  • 52.  It affect computer in two ways:- 1. Power fluctuations , when the strength of your electrical service rises or falls , can cause component failures 2. Power failure , when power is lost altogether , cause systems to shut down.
  • 53.  YOU CAN EQUIP YOUR SYSTEM WITH ONE OF THE FOLLOWING DEVICES:  Protect against voltage spikes, these inexpensive plugs can be bought in most hardware stores.  Protect additional functions . They are safeguard against line noise .
  • 54.  They are essentially a battery backup for your computer .  Protect system from electrical events including a total loss of power .
  • 55.  A vandal can do tremendous damage to a computer , resulting in total loss of the system & the data it stores .  Special locks are available that can attach a system unit , monitor , or other equipment to a desk , making it very difficult to move
  • 56.  Disaster planning addresses natural & man-made disasters . It is not called “disaster prevention” because things like earth-quakes & hurricanes are hard to predict & impossible to prevent.
  • 57. 1. Be aware that a disaster could strike & anticipate .  when conditions are right ; e.g.  If you live on the East Coast of the United States , you know when to anticipate a hurricane .