[Students first and laPst name]
[Name of school/organization/job you are representing-since you are a student, put the name of the school]
TOPIC: Problems and solutions associated with spyware.
SPECIFIC PURPOSE: To inform my audience members of the dangers of spyware so that they may take appropriate steps to prevent infection.
THESIS STATEMENT: Computer and smartphone users must understand the evolving nature of spyware and what it can do in order to take the necessary steps to protect themselves.
Introduction
I. Do you worry about identity theft online?
II. Are you anxious about the security of your passwords and credit card numbers? [Attention getter]
III. Many of you are aware of software known as spyware that can install itself on your computer and smartphone without your knowledge and harvest sensitive information, and many of you have taken steps to protect yourself.
IV. Computer and smartphone users must understand the evolving nature of spyware and what it can do in order to take the necessary steps to protect themselves. [Thesis Statement]
V Today, I’ll talk about what forms spyware takes, how it gets into your computer, the harm it causes, and how to keep your computer and smartphone from becoming infected by it. [Preview Statement]
TRANSITION: So, what is the state of spyware today?
Body
I. Spyware is a type of privacy invasion software known as malware.
A. According to a history of spyware published on the Federal Trade Commission’s on Web site, February 2008, until the year 2000, spyware referred to monitoring devices on cameras .
A.1. The term first appeared in a software context in an ad for the security program ZoneAlarm.
A.2. Today, spyware signifies any computer code that installs itself on your computer, gathers data from it, and sends it back to a remote computer without your consent
B. Some types of spyware track your Web-browsing habit, selling this information
Cited: CNET.com. (2010). Virus vs. Spyware. Retrieved from http://cnettv.cnet.com/?tag=hdr;snav. Federal Trade Commission. (2008). Spyware: Quick Facts. Retrieved from http://www.onguardonline.gov/topics/spyware.aspx. Google Webs Search Help. (2010). Suspicious Results and Strange Behavior: Strange Pop-Ups and Other Malware. Google.com. Retrieved August 30, 2010, from http://www.google.com/support/websearch/bin/answer.py?hl=en&answer=809. GovTrack.us. (n.d.). H.R. 1525: Internet Spyware (I-SPY) Prevention Act of 2007. Retrieved from http://www.govtrack.us/congress/bill.xpd?bill=h110-1525 Identity Theft 911 Microsoft Security Web site. (2010). Watch Out for Fake Virus Alerts. Retrieved August 25, 2010, from www.microsoft.com/security/antivirus/rogue.aspx. National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723 Ramirez, J Rubenking, N. (2008, February 5). Nine Ways to Wipe Out Spyware. PC Magazine, pp. http://www.pcmag.com/article2/0,2817,2255854,00.asp. Rubenking, N. (2010, July 6). Free Virus and Spyware Protection: What 's Right for You? PC Magazine, pp. http://www.pcmag.com/article2/0,2817,2356509,00.asp. StaySafeOnline.org. (2010). National Survey: Online Safety Is a Personal Priority for Americans. Retrieved August 30, 2010, from http://staysafeonline.mediaroom.com/index.php?s=43&item=62