Разделы презентаций


Cyber Spying in world today

ContentCyber spyingSpywareFeatures of functioningHistory and developmentScope of UseMethods of treatment and preventionReference

Слайды и текст этой презентации

Слайд 1CYBER SPYING IN WORLD TODAY
Cyber espionage

Adil Akhmetzhanov IS-147R

CYBER SPYING IN WORLD TODAYCyber espionage Adil Akhmetzhanov IS-147R

Слайд 2Content
Cyber spying
Spyware
Features of functioning
History and development
Scope of Use
Methods of treatment

and prevention
Reference

ContentCyber spyingSpywareFeatures of functioningHistory and developmentScope of UseMethods of treatment and preventionReference

Слайд 3Cyber spying
Cyberespionage or computer spying (also used the term "cyber

reconnaissance") - a term denoting tend to steal information in

order to obtain personal, economic, political or military superiority, carried out with the use of bypass (hacking) computer security systems, with the use of malware software, including "Trojan horses" and spyware. Typically, cyber-espionage operations are illegal in the country of victim, while in the aggressor country they are support at the highest levels.
Cyber spyingCyberespionage or computer spying (also used the term

Слайд 4Spyware
Spyware (spyware software) - a program that surreptitiously installed on

your computer to collect information about your computer configuration, user,

user activity without consent. Can also perform other actions: changing the settings, software installation without the user's knowledge, redirecting user actions. Now, there are many definitions and interpretations of the term spyware.
SpywareSpyware (spyware software) - a program that surreptitiously installed on your computer to collect information about your

Слайд 5Features of functioning
Spyware can carry out a wide range of

tasks, such as:
Collect information about the habits of Internet use

and the most frequently visited sites (tracking software);
Remember keystrokes (Keyloggers) and record screenshots (screen scraper) to continue to send information to the creator spyware;
Illegally and remotely control a computer (remote control software) - backdoors, botnets, droneware;

Installed on the user's computer additional programs;
Used for unauthorized analysis of security systems (security analysis software) - scanners of ports and vulnerabilities and burglars of passwords;
Change the settings of the operating system (system modifying software) - rootkits interceptors control (hijackers) and so on. - resulting in a reduction of speed of Internet connection or loss of connection itself, the opening of other home pages or removal of certain programs;

Features of functioningSpyware can carry out a wide range of tasks, such as:Collect information about the habits

Слайд 6HISTORY AND DEVELOPMENT

HISTORY AND DEVELOPMENT

Слайд 7History and development
According to AOL and National Cyber-Security Alliance of

2005, 61% of respondents of computers contain some form of

spyware, of which 92% of users were not aware of presence spyware on their machines, and 91% reported that they did not give permission for the installation of spyware.
History and developmentAccording to AOL and National Cyber-Security Alliance of 2005, 61% of respondents of computers contain

Слайд 8History and development
By 2006, spyware have become one of the

prevailing threats to the security of computer systems using Windows.

Computers in which Internet Explorer serves as the main browser are partially vulnerable not because Internet Explorer is most widely used, but due to the fact that its tight integration with Windows allows spyware access to key nodes OS.
History and developmentBy 2006, spyware have become one of the prevailing threats to the security of computer

Слайд 9SCOPE OF USE
Among the possible applications of "potentially unwanted technologies"

is both legitimate and fraudulent.

SCOPE OF USEAmong the possible applications of

Слайд 10LEGITIMATE APPLICATIONS
Tracking Software (tracking software) is widely used and legal

for monitoring PCs.
Adware can openly be included in composition of

free and shareware software. The user agrees to view advertising to have any further opportunity (for example - to use this program free of charge). In this case, the presence of adware should clearly prescribed in the end-user agreement (EULA).
Software modifications to the system can used for personalization of the desired user.

Program the remote control and monitoring can used for remote technical support or access to their own resources, which are located on the remote computer.
Program for automatic download can used to automatically updates, applications and OS updates.
Program for the analysis of security systems used to study the vulnerability of computer systems and other perfectly legitimate purposes.
Passive tracking technologies may be useful to personalize web pages visited by user.


LEGITIMATE APPLICATIONSTracking Software (tracking software) is widely used and legal for monitoring PCs.Adware can openly be included

Слайд 11DIGITAL COPYRIGHT PROTECTION

DIGITAL COPYRIGHT PROTECTION

Слайд 12METHODS OF TREATMENT AND PREVENTION

METHODS OF TREATMENT AND PREVENTION

Слайд 13MEASURES TO PREVENT INFECTION

MEASURES TO PREVENT INFECTION

Слайд 14Reference
Cyber Spying. Copyright © Wikipedia 2001-2015. Retrieved March 04, 2015

from http://en.wikipedia.org/wiki/Cyber_spying
Spyware. Copyright © Wikipedia 2001-2015. Retrieved March 04, 2015

from https://ru.wikipedia.org/wiki/Spyware

ReferenceCyber Spying. Copyright © Wikipedia 2001-2015. Retrieved March 04, 2015 from http://en.wikipedia.org/wiki/Cyber_spyingSpyware. Copyright © Wikipedia 2001-2015. Retrieved

Слайд 15THANK YOU FOR YOUR ATTENTION

THANK YOU FOR YOUR ATTENTION

Обратная связь

Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое TheSlide.ru?

Это сайт презентации, докладов, проектов в PowerPoint. Здесь удобно  хранить и делиться своими презентациями с другими пользователями.


Для правообладателей

Яндекс.Метрика