rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781597490641

Combating Spyware in the Enterprise

by
  • ISBN13:

    9781597490641

  • ISBN10:

    1597490644

  • Format: Paperback
  • Copyright: 2006-09-05
  • Publisher: Elsevier Science
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $54.95 Save up to $0.05
  • Buy New
    $54.90
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

    7-Day eTextbook Access 7-Day eTextbook Access

Summary

One of the more frightening aspects of spyware in the enterprise is the perception that it is an annoyance, not a serious threat to enterprise assets. According to one study, more than 96 percent of enterprises felt that their firewall and antivirus solutions provided sufficient protection. The same survey found that out of the group surveyed, 82 percent reported that their desktop environment was currently infected by spyware. This indicates not only the level of infectious spread of spyware but also the inadequacies of normal techniques in combating this threat. Combating Spyware in the Enterprise is must reading for anyone responsible for the security of an enterprise's network. Book jacket.

Table of Contents

An Overview of Spyware
1(26)
Introduction
2(1)
Spyware: Defined
2(5)
How Spyware Works
2(3)
Why Spyware Is Not a ``Virus''
5(1)
Commonly Seen Spyware
5(1)
Identity Theft
6(1)
Malware: Defined
7(2)
How Malware Works
7(1)
Commonly Seen Malware
8(1)
Adware: Defined
9(2)
How Adware Works
9(1)
Commonly Seen Adware
10(1)
Parasiteware: Defined
11(1)
How Parasiteware Works
11(1)
Commonly Seen Parasiteware
12(1)
Phishing: Defined
12(6)
How Phishing Works
12(2)
Commonly Seen Phishing Attacks
14(1)
PayPal
14(1)
eBay
15(1)
Citibank
16(1)
Washington Mutual
17(1)
IRS Tax Refund
18(1)
Botnets: Defined
18(3)
How Botnets Work
19(1)
Commonly Seen Botnets
19(2)
Summary
21(1)
Solutions Fast Track
21(3)
Frequently Asked Questions
24(3)
The Transformation of Spyware
27(22)
Introduction
28(1)
The Humble Beginnings
28(10)
Targeted Marketing
28(2)
Hitting the Internet Target
30(1)
Selling Software
31(1)
Adware Evolves
32(2)
Making a Name for Itself
34(1)
All Roads Lead to Microsoft
34(1)
The Making of a Buzzword
34(1)
The Early Effects of Spyware
35(1)
Early Means of Prevention
35(3)
Spyware in the Twenty-First Century
38(4)
How Spyware Has Evolved
38(1)
Increased Use of Spyware in the Commission of Criminal Acts
39(2)
Antispyware Legislation
41(1)
The Future of Spyware
42(2)
Summary
44(1)
Solutions Fast Track
44(2)
Frequently Asked Questions
46(3)
Spyware and the Enterprise Network
49(30)
Introduction
50(1)
Keystroke Loggers
51(11)
How Keystroke Loggers Work
53(3)
Known Keystroke Loggers
56(1)
KeyGhost
56(1)
KEYKatcher/KEYPhantom
57(1)
Invisible KeyLogger Stealth
58(1)
Spector
58(1)
Boss Every Where
59(1)
Known Exploits
60(2)
Trojan Encapsulation
62(6)
How Spyware Works with Trojan Horses
63(2)
Known Spyware/Trojan Software
65(1)
D1Der
65(1)
Sony Digital Rights Management
66(1)
Kazanon
67(1)
Spyware and Backdoors
68(7)
How Spyware Creates Backdoors
68(2)
Known Spyware/Backdoor Combinations
70(1)
A Wolf in Sheep's Clothing: Fake Removal Tools
71(4)
Summary
75(1)
Solutions Fast Track
75(2)
Frequently Asked Questions
77(2)
Real Spyware---Crime, Economic Espionage, and Espionage
79(64)
Introduction
80(1)
White to Gray to Black---Increasing Criminal Use of Spyware
81(1)
White to Gray---Ethical to Unethical
82(7)
Hacker Ethic to Criminal Ethic
82(2)
Unethical Practices for the Benefit of Companies
84(2)
Spyware for Government Use
86(2)
It's All in the Delivery
88(1)
Targeted, Networked Spyware
89(11)
Phishing Overview
89(4)
Botnets Overview
93(6)
The Botnet-Spam and Phishing Connection
99(1)
Phishing Detection
100(8)
What to Look For
100(6)
Tools
106(1)
Internet Resources
107(1)
Reporting Phishing
108(8)
Law Enforcement
110(2)
Antiphishing Consortiums
112(3)
Antiphishing Software Vendors
115(1)
Bot Detection
116(9)
Detecting Bots on a Host
116(2)
Finding Botnets
118(7)
Tools
125(1)
Internet Resources
125(1)
Reporting Botnets
125(6)
Law Enforcement
129(1)
Antibotnet Consortiums
130(1)
Summary
131(4)
Solutions Fast Track
135(6)
Frequently Asked Questions
141(2)
Solutions for the End User
143(58)
Introduction
144(1)
Freeware Solutions
144(35)
Ad-Aware Personal
145(1)
Installing Ad-Aware Personal
145(1)
Scanning for Spyware
146(3)
Reviewing Detected Spyware
149(2)
Additional Ad-Aware Features
151(3)
Spybot -- Search & Destroy
154(1)
Installing Spybot -- Search & Destroy
154(3)
Updating Spybot -- Search & Destroy
157(1)
Scanning for Spyware
158(1)
Additional Spybot Features
159(5)
Microsoft Windows Defender
164(1)
Installing Windows Defender
165(2)
Scanning for Spyware
167(2)
Reviewing Detected Spyware
169(3)
Windows Defender Tools
172(4)
AntiSpyware versus Windows Defender
176(1)
Keylogger Hunter
177(1)
Testing Keylogger Hunter
178(1)
Toolbar Solutions
179(6)
12Ghosts Popup-Killer
179(2)
Yahoo! Anti-Spy Toolbar
181(3)
Google Toolbar
184(1)
Mozilla Firefox
185(1)
Licensed Solutions
185(10)
Webroot Spy Sweeper
186(1)
Ad-Aware Plus
187(3)
McAfee AntiSpyware
190(2)
SpyCop
192(3)
Summary
195(2)
Solutions Fast Track
197(1)
Frequently Asked Questions
198(3)
Forensic Detection and Removal
201(64)
Introduction
202(1)
Manual Detection Techniques
202(21)
Working with the Registry
203(1)
Registry Basics
203(3)
Start-Up Applications
206(2)
File Association Hijacking
208(1)
Detecting Unknown Processes
209(4)
Researching Unknown Processes
213(3)
Detecting Spyware Remnants
216(1)
Temporary File Caches
216(2)
Windows System Restore
218(1)
Windows File Protection
219(1)
Windows Hosts File
220(2)
Internet Explorer Settings
222(1)
Detection and Removal Tools
223(30)
Hijack This
224(2)
Reviewing Hijack This Results
226(3)
Reviewing a Hijack This Sample Log
229(5)
Removing Detected Items
234(1)
Hijack This Miscellaneous Tools
235(1)
a2 HiJackFree
236(4)
InstallWatch Pro
240(1)
Performing a Scan with the InstallWatch Pro Wizard
241(4)
Performing a Scan without the InstallWatch Pro Wizard
245(1)
Reviewing InstallWatch Pro Results
246(1)
Unlocker
247(2)
VMware
249(3)
Snapshots
252(1)
Enterprise Removal Tools
253(5)
BigFix Enterprise Suite
253(3)
FaceTime
256(1)
Websense Web Security Suite
257(1)
Summary
258(2)
Solutions Fast Track
260(2)
Frequently Asked Questions
262(3)
Dealing with Spyware in a Non-Microsoft World
265(22)
Introduction
266(1)
Spyware and Linux
266(8)
Does It Exist?
266(1)
What Keeps Linux Spyware Free?
267(1)
Linux Is Not a Large Enough Target
267(1)
Linux Is Fundamentally Not Vulnerable to These Types of Attacks
268(1)
The Definitive Answer?
269(1)
Root Security
270(1)
Malware, Worms, and Viruses
271(1)
Examples
272(2)
Spyware and the Macintosh
274(8)
OS X Viruses and Malware
274(1)
Leap-A
274(1)
Inqtana.A
275(1)
Tools for the Macintosh
276(1)
MacScan
276(6)
Summary
282(1)
Solutions Fast Track
283(1)
Frequently Asked Questions
284(3)
The Frugal Engineer's Guide to Spyware Prevention
287(48)
Introduction
288(1)
Locking Down Internet Explorer
288(13)
Social Engineering
290(1)
Drive-by Downloads
291(2)
Locking Down Internet Explorer
293(7)
Pop-Up Blocker
300(1)
Developing a Security Update Strategy
301(12)
Using Microsoft WSUS
302(6)
Microsoft Baseline Security Analyzer
308(2)
Windows Checks
310(1)
IIS Checks
311(1)
SQL Server Checks
311(1)
Desktop Application Checks
312(1)
Securing E-mail
313(5)
Securing Outlook
315(3)
Securing Windows
318(11)
Using Group Policy
324(5)
Summary
329(1)
Solutions Fast Track
330(2)
Frequently Asked Questions
332(3)
Appendix A Malware, Money Movers, and Ma Bell Mayhem!
335(40)
Introduction
336(1)
Mule Driving and Money Laundering
336(6)
How Phishers Set Up Shop
337(1)
The Process of Receiving the Money
338(3)
Western Union
341(1)
Mule Liability and Position
341(1)
U.S. Operations and Credit Cards
341(1)
Phishers Phone Home
342(11)
Defining Telecommunications Today
342(2)
SIP Overview
344(1)
SIP Communication
345(1)
Caller ID Spoofing
346(3)
SBC Network Takeover
349(3)
Anonymous Telephony
352(1)
Phreakin' Phishers!
352(1)
Slithering Scalability
353(17)
Malware in 2004
354(1)
Early 2004
354(1)
Mid--2004
355(1)
End of 2004
356(1)
Trojans of 2004
356(1)
Malware in 2005
357(1)
Malware Distribution Process
357(10)
Botnets
367(2)
Blind Drops
369(1)
The Phuture of Phishing
370(1)
Summary
371(1)
Solutions Fast Track
371(2)
Frequently Asked Questions
373(2)
Index 375

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program