Preview

cow papper english

Best Essays
Open Document
Open Document
1388 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cow papper english
Staying Ahead of Spyware
[Students first and laPst name]
[Name of school/organization/job you are representing-since you are a student, put the name of the school]
TOPIC: Problems and solutions associated with spyware.

SPECIFIC PURPOSE: To inform my audience members of the dangers of spyware so that they may take appropriate steps to prevent infection.

THESIS STATEMENT: Computer and smartphone users must understand the evolving nature of spyware and what it can do in order to take the necessary steps to protect themselves.

Introduction
I. Do you worry about identity theft online?
II. Are you anxious about the security of your passwords and credit card numbers? [Attention getter]
III. Many of you are aware of software known as spyware that can install itself on your computer and smartphone without your knowledge and harvest sensitive information, and many of you have taken steps to protect yourself.
IV. Computer and smartphone users must understand the evolving nature of spyware and what it can do in order to take the necessary steps to protect themselves. [Thesis Statement]
V Today, I’ll talk about what forms spyware takes, how it gets into your computer, the harm it causes, and how to keep your computer and smartphone from becoming infected by it. [Preview Statement]
TRANSITION: So, what is the state of spyware today?
Body
I. Spyware is a type of privacy invasion software known as malware.
A. According to a history of spyware published on the Federal Trade Commission’s on Web site, February 2008, until the year 2000, spyware referred to monitoring devices on cameras .
A.1. The term first appeared in a software context in an ad for the security program ZoneAlarm.
A.2. Today, spyware signifies any computer code that installs itself on your computer, gathers data from it, and sends it back to a remote computer without your consent
B. Some types of spyware track your Web-browsing habit, selling this information



Cited: CNET.com. (2010). Virus vs. Spyware. Retrieved from http://cnettv.cnet.com/?tag=hdr;snav. Federal Trade Commission. (2008). Spyware: Quick Facts. Retrieved from http://www.onguardonline.gov/topics/spyware.aspx. Google Webs Search Help. (2010). Suspicious Results and Strange Behavior: Strange Pop-Ups and Other Malware. Google.com. Retrieved August 30, 2010, from http://www.google.com/support/websearch/bin/answer.py?hl=en&answer=809. GovTrack.us. (n.d.). H.R. 1525: Internet Spyware (I-SPY) Prevention Act of 2007. Retrieved from http://www.govtrack.us/congress/bill.xpd?bill=h110-1525 Identity Theft 911 Microsoft Security Web site. (2010). Watch Out for Fake Virus Alerts. Retrieved August 25, 2010, from www.microsoft.com/security/antivirus/rogue.aspx. National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723 Ramirez, J Rubenking, N. (2008, February 5). Nine Ways to Wipe Out Spyware. PC Magazine, pp. http://www.pcmag.com/article2/0,2817,2255854,00.asp. Rubenking, N. (2010, July 6). Free Virus and Spyware Protection: What 's Right for You? PC Magazine, pp. http://www.pcmag.com/article2/0,2817,2356509,00.asp. StaySafeOnline.org. (2010). National Survey: Online Safety Is a Personal Priority for Americans. Retrieved August 30, 2010, from http://staysafeonline.mediaroom.com/index.php?s=43&item=62

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the article the “Undercover Parent” Harlan Coben, the author, states evident facts about using spyware. He also says what his personal thoughts were and how they changed. The article goes through Harlan Coben’s research and studies about spyware. At first Harlan Coben was against using spyware, but after further research he changes his mind he finally understands the good use of using spyware.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    In Corbon essay, the Undercover boss he brings up several different contradiction to his opinion on the spyware software. One of the most profound statements is the fact that he agrees in using the software yet compares it to there are limits to what should be monitored and why. Another thing he does is to compare using spyware to reading a kids diary and believes it could be wrong. Lastly, he states that it whomever you are using the software on should be informed that they are being monitored by you, thus defeating the purpose of spy whole definition. Another shocking thing is that he says that the cellphones should not be monitored but that is the dangerous because it is a one on one personal relationship or forming relationship, once a…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    * User education in awareness, safe computing practices, indicators of malicious code, and response actions.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The understanding of the use if spyware is extremely heavily expressed in the paper, and the author provides insight on how and when it should be used, “there is a thin line between being responsibly protective and irresponsibly nosy”(Coben.) I believe this line is…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    independent

    • 759 Words
    • 4 Pages

    1 Attention Catcher: You are at risk. All of us are at risk. I’m not talking about STDs, global warming, or terrorism. I’m talking about your life online. You’re at risk of having your computer taken over so that perfect strangers can read your e-mail, access your bank accounts, pilfer your credit card numbers, and even steal your identity.…

    • 759 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Malicious software called malware such as viruses, worms, Trojan horses, and spyware can all cause security breaches within an organization as well as towards its clients. “Internet security firm Symantec reported in 2011 that it had detected 286 million new and unique threats from malicious software in 2010, or about nine per second, up from 240 million in 2009.” A computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. Worms are independent computer programs that copy themselves from one computer to other computers over a network. Worms destroy data and programs as well as disrupt or even halt the operation of computer networks. The Trojan horse is not itself a virus because it does not replicate, but it is often a way for viruses or other malicious code to be introduced into a computer system. The Trojan horse appears to be nonthreatening but then does something other than expected. (K. Laudon, J. Laudon, 2013, p. 226-227) Security breaches can also occur from hackers or even from unsecured laptop computers and workstations, password hacked or revealed, improper storing of documents and files and unsecured disposal.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Better Essays

    application files) or to the boot sector of a disk. When an infected file is…

    • 4808 Words
    • 20 Pages
    Better Essays
  • Better Essays

    How Stuff Works, Inc (2013). How do viruses and worms spread in e-mail? Retrieved from…

    • 2028 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Damn It!!

    • 836 Words
    • 4 Pages

    5. Ways of computer viruses enter your computer Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.…

    • 836 Words
    • 4 Pages
    Better Essays
  • Good Essays

    first aid

    • 622 Words
    • 2 Pages

    Malware-software that is intended to damage or disable computers and computer systems. Sometimes I think what does this mean until I joined web design. Some people don’t care what they open on their computer but when it crashes they get mad and go out and spend hundreds of dollars to fix it. Little do they know it is free to get rid of all they have to do is wipe their computer clean. I don’t mean with a clean rag and Windex for those who want to be a smarty pants about it.…

    • 622 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It255 Iloveyou Virus

    • 387 Words
    • 2 Pages

    Cited: Rouse, Margaret. "ILOVEYOU Virus." What Is ? Search Security, Feb. 2006. Web. 02 Mar. 2013.…

    • 387 Words
    • 2 Pages
    Good Essays

Related Topics