Preview

Spyware

Powerful Essays
Open Document
Open Document
2744 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Spyware
1. Introduction Has your computer ever worked so slowly that you cannot sit still and keep your temper any more but switch the machine off? Spyware may be to blame.

The first recorded use of the term spyware occurred in 1994, referring to spying equipment such as tiny cameras. In early 2000, a scientist named Steve Gibson realized that advertising software had been installed on his system, and he suspected that the software was stealing his personal information. Since then, spyware has been defined as software applications were designed to monitor and report computer user activities remotely (WikiPedia).

It is estimated that spyware has been installed on over 85% of personal computers (Farrow, 2003). A recent survey by an Internet Service Provider found an average of 28 spyware items installed per computer (Thompson, 2003). A November 2004 study by AOL and the National Cyber-Security Alliance showed that, 80% of surveyed users ' computers had some forms of spyware, with an average of 93 spyware components per computer. 89% of surveyed users with spyware reported that they did not know of its presence, and 95% reported that they had not given permission for the installation of the spyware (America Online and the National Cyber Security Alliance, 2004). As a matter of fact, it is obvious that we are facing one of the most dangerous threats from the Internet and knowing how to prevent computers from being infected spyware is essential. This paper, with the purpose of providing computer users with basic knowledge of spyware, analyses different aspects of spyware, including the definition, ways to infects computers, effects and solutions to get rid of it.

2. Definition of Spyware There are many ways to define what spyware is. According to Susannah Fox (2005, p.2), Associate Director of Pew Internet & American Life Project, spyware is “a software that is placed secretly on a computer in order to track a user’s behaviour and



References: America Online and the National Cyber Security Alliance, 2004: “AOL/NCSA Online Safety Study” Available at URL: http://www.staysafeonline.info/pdf/safety_study_v04.pdf (Accessed 25 April 2006) Coustan, D. (1998): How stuff works: How spyware work Available at URL: http://computer.howstuffworks.com/spyware.htm (Accessed 27 April 2006) Farrow, R p. 52 Federal Trade Commission, 2005, "Monitoring Software on Your PC: (Accessed 28 April 2006) Fox, S (Accessed 20 April 2006) Thompson, R Available at URL: http://www.iwar.org.uk/comsec/resources/consumerrisk/Thompson1799.htm (Accessed 29 April 2006) Available at URL: http://anti-spyware-review.toptenreviews.com (Accessed 25 April 2006) (Accessed 25 April 2006)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the article the “Undercover Parent” Harlan Coben, the author, states evident facts about using spyware. He also says what his personal thoughts were and how they changed. The article goes through Harlan Coben’s research and studies about spyware. At first Harlan Coben was against using spyware, but after further research he changes his mind he finally understands the good use of using spyware.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In Harlan Coben’s article, “The Undercover Parent”(March 6,2008) he talks about the dangers on the internet and how we can prevent our children from the dangers by using spyware. I agree him about spyware. I think it can stop many things from happening.…

    • 243 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Harlen Coben, the author of the article “Undercover parent”, makes a great point about using spyware on your childrens electronic devices, but, not great enough.…

    • 213 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Not long ago, we read an article , written by Harlan coben titled The undercover parent, an opinion paper on parents using spyware on their children's computers. At the beginning of the article the writer informs us that they previously thought that this was just a wrong unjustified invasion of privacy, however, after the author did some research they Still did not support the idea, but they understood why it is used and stated it was a beneficial idea.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    Accidentally I downloaded the virus called PUP.Chipopo on my Windows 10 computer and it is continuously popping browser screen with the annoying and unwanted ads. How to remove PUP.Chipopo? How to stop irritating ads? Why my computer is performing sluggishly?…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Spy-ware is a program that is inadvertently installed on the user’s computer without their knowledge the program covertly obtains data from the computer and transmits it to another. Spy-ware can track the websites that the user visits, collect information on the user’s clicks, gather keystrokes and obtain sign in and passwords. Spy-ware can be of a conspicuous nature where the user is somewhat aware of; additional pop-up advertising, slowing down of computer processing, and computer setting changes. The most concerning type of spy-ware has traits that are…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Spyware is a software that aims to gather information about a person or organization without their knowledge, and usually without consent. One opinion of spyware is highlighted in Harlan Coben’s essay, “The Undercover Parent” (2008). It claims that parents should install spyware in their…

    • 974 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    Windows, a much younger operating system, released in 1985, has exponentially grown in popularity ever since. Windows popularity is the biggest reason that it suffers malicious attacks more than any other operating system available. The numerous attacks…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Good Essays

    “If someone was viewing every keystroke that you were doing on a machine like your personal information, such as your credit card information, private notes, bills, etc.,” would you think that is invasive to your privacy or even illegal? Spyware allows the holder to monitor every touch of a key that the victim makes and everything that they do online. Also these parents are arguing over this software and asking themselves if they trust their children on the internet. My statement is that spyware is a large invasion of privacy and parents do not think that their child isn’t responsible, don’t let them use it in the first place.…

    • 403 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    A. According to a history of spyware published on the Federal Trade Commission’s on Web site, February 2008, until the year 2000, spyware referred to monitoring devices on cameras .…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Good Essays

    The newspaper reported US spies had hacked foreign networks, introducing spyware into millions of computers.…

    • 869 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Identity Theft Outline

    • 1438 Words
    • 6 Pages

    To accomplish this act, most thieves find a way in which they can compromise a computer, they can do this by creating spyware in some sites we want to download files or software, when we try to open email attachments or click on pop-ups when we visit devious websites. This spyware is able to quietly transmit one’s personal information, which can include: Credit card numbers, Bank account numbers, Social Security numbers, usernames and passwords, address books, including email addresses while connected to the…

    • 1438 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The Power of Rootkits

    • 1152 Words
    • 3 Pages

    A rootkit is a type of malicious software that has the ability to compromise a computer without the user or operating system knowing it. Rootkits allows malware and viruses to hide out in the open by disguising as files that are necessary that your antivirus program will overlook. A rootkit itself is not dangerous; it is when they are then used to hide malware, viruses, bots, and worms. How rootkits got their name is from the Unix term for the primary administrator account called root, and kit refers to the software pieces that apply the tool. (tools)…

    • 1152 Words
    • 3 Pages
    Good Essays