Preview

Spyware

Better Essays
Open Document
Open Document
2042 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Spyware
Case: Using Technology to Identify Who We are and to Track What We Do

Contents

Summary
After perusing the internet Mr. Anderson’s home laptop started to perform commands on its own, without Mr. Anderson’s input. An ad for Spy-Wiper appeared on his laptop warning him that if he wanted to protect his laptop he had to sign up for the program that would clear his system of any rogue software. When Mr. Anderson arrived at work the following day he discovered that his office computers displayed similar messages from Spy-Wiper. Spy-Wiper was using coercion tactics to intimidate users into signing up for their software, holding the user’s computer hostage until they complied. Spy-Wiper created the threat and supplied the solution.
Internet users have to adjust their web surfing and downloading tactics in order to avoid becoming victims of a spy-ware attack.
History
Spyware has quickly become the most prevalent threat to a computer system. Not too long ago the biggest threat to a computer system was a virus which is small computer program that copies itself from one computer to the next, with the intent of harming the computer system’s data and performance. The other major threat was spam which is seemingly not as catastrophic as a virus. Spam also known as unsolicited bulk email is when a company or person sends out the same email message to a large group of recipients indiscriminately.
Spy-ware is a program that is inadvertently installed on the user’s computer without their knowledge the program covertly obtains data from the computer and transmits it to another. Spy-ware can track the websites that the user visits, collect information on the user’s clicks, gather keystrokes and obtain sign in and passwords. Spy-ware can be of a conspicuous nature where the user is somewhat aware of; additional pop-up advertising, slowing down of computer processing, and computer setting changes. The most concerning type of spy-ware has traits that are



References: Hinde, Stephen. "Spyware: The Spy In The Computer." Computer Fraud & Security 2004.12 (2004): 15-16. Academic Search Premier. Web. 15 June 2013. Awad, Neveen Farag, and Kristina Fitzgerald. "The Deceptive Behaviors That OFFEND US MOST About Spyware." Communications Of The ACM 48.8 (2005): 55-60. Business Source Elite. Web. 15 June 2013. Freeman, Lee A., and Andrew Urbaczewski. "Why Do People Hate Spyware?." Communications Of The ACM 48.8 (2005): 50-53. Business Source Elite. Web. 15 June 2013.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the article the “Undercover Parent” Harlan Coben, the author, states evident facts about using spyware. He also says what his personal thoughts were and how they changed. The article goes through Harlan Coben’s research and studies about spyware. At first Harlan Coben was against using spyware, but after further research he changes his mind he finally understands the good use of using spyware.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Not long ago, we read an article , written by Harlan coben titled The undercover parent, an opinion paper on parents using spyware on their children's computers. At the beginning of the article the writer informs us that they previously thought that this was just a wrong unjustified invasion of privacy, however, after the author did some research they Still did not support the idea, but they understood why it is used and stated it was a beneficial idea.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    As the first of its kind, McAfee Spyware Blocker, has set itself apart from other spyware blockers. The software provides protection on mobile devices, and from unwanted sharing of information when downloading applications. The software creates a separate profile based on user preferences, which block all real information of the user. It then forces applications to use false information, created by the user, to run applications that require access to…

    • 1587 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    4. Social engineering attacks that involve creating a scenario and using deception for information gathering purposes…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Vernon, M. (2004, April). Top five threats. Retrieved July 23, 2014, from Computer Weekly: http://www.computerweekly.com/feature/Top-five-threats…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    Today, I’ll talk about what forms spyware takes, how it gets into your computer, the…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The Undercover Parent

    • 337 Words
    • 2 Pages

    The essay begins with Coben showing his initial uneasiness towards the use of spyware. He first states that it’s an “invasion of privacy.” He also mentions that his, as well as many other parents, reluctance may have started from the word; spyware. It is a scary but good idea that some parents won’t even consider. Cobin points out that the word Spyware brings up associations of Dick Cheney sitting in a dark room, rubbing his hands together and reading your most private thoughts. Loving parents already monitor their children by watching over their home and school environment. Some overprotective parents fight their kid’s battles on the playground and criticize coaches about playing time; however, when it comes to chatting with pedophiles, or watching beheadings or gambling away the family’s entire life savings then their children deserve independence.…

    • 337 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Today 's risk of surfing the internet has increased as a variety of threats have emerged. However; many people fail to understand the importance of internet security. A number of people do not apply or just apply the basic of security software until they realise there is a risk. Consequently, their computers are being infiltrated or infected. Some people are unaware of personal information being stolen or misused, which can present many security issues to the user. As one part of privacy, personal information has to be protected by internet users due to the many attacks that are intended to obtain your personal information for profit.…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Is Your Information Safe?

    • 1575 Words
    • 7 Pages

    window to get into your house. He doesn't hold a gun to your head, nor does he…

    • 1575 Words
    • 7 Pages
    Powerful Essays