Preview

Spyware

Powerful Essays
Open Document
Open Document
2744 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Spyware
1. Introduction Has your computer ever worked so slowly that you cannot sit still and keep your temper any more but switch the machine off? Spyware may be to blame.

The first recorded use of the term spyware occurred in 1994, referring to spying equipment such as tiny cameras. In early 2000, a scientist named Steve Gibson realized that advertising software had been installed on his system, and he suspected that the software was stealing his personal information. Since then, spyware has been defined as software applications were designed to monitor and report computer user activities remotely (WikiPedia).

It is estimated that spyware has been installed on over 85% of personal computers (Farrow, 2003). A recent survey by an Internet Service Provider found an average of 28 spyware items installed per computer (Thompson, 2003). A November 2004 study by AOL and the National Cyber-Security Alliance showed that, 80% of surveyed users ' computers had some forms of spyware, with an average of 93 spyware components per computer. 89% of surveyed users with spyware reported that they did not know of its presence, and 95% reported that they had not given permission for the installation of the spyware (America Online and the National Cyber Security Alliance, 2004). As a matter of fact, it is obvious that we are facing one of the most dangerous threats from the Internet and knowing how to prevent computers from being infected spyware is essential. This paper, with the purpose of providing computer users with basic knowledge of spyware, analyses different aspects of spyware, including the definition, ways to infects computers, effects and solutions to get rid of it.

2. Definition of Spyware There are many ways to define what spyware is. According to Susannah Fox (2005, p.2), Associate Director of Pew Internet & American Life Project, spyware is “a software that is placed secretly on a computer in order to track a user’s behaviour and



References: America Online and the National Cyber Security Alliance, 2004: “AOL/NCSA Online Safety Study” Available at URL: http://www.staysafeonline.info/pdf/safety_study_v04.pdf (Accessed 25 April 2006) Coustan, D. (1998): How stuff works: How spyware work Available at URL: http://computer.howstuffworks.com/spyware.htm (Accessed 27 April 2006) Farrow, R p. 52 Federal Trade Commission, 2005, "Monitoring Software on Your PC: (Accessed 28 April 2006) Fox, S (Accessed 20 April 2006) Thompson, R Available at URL: http://www.iwar.org.uk/comsec/resources/consumerrisk/Thompson1799.htm (Accessed 29 April 2006) Available at URL: http://anti-spyware-review.toptenreviews.com (Accessed 25 April 2006) (Accessed 25 April 2006)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the article the “Undercover Parent” Harlan Coben, the author, states evident facts about using spyware. He also says what his personal thoughts were and how they changed. The article goes through Harlan Coben’s research and studies about spyware. At first Harlan Coben was against using spyware, but after further research he changes his mind he finally understands the good use of using spyware.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    In Harlan Coben’s article, “The Undercover Parent”(March 6,2008) he talks about the dangers on the internet and how we can prevent our children from the dangers by using spyware. I agree him about spyware. I think it can stop many things from happening.…

    • 243 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Harlen Coben, the author of the article “Undercover parent”, makes a great point about using spyware on your childrens electronic devices, but, not great enough.…

    • 213 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Spy-ware is a program that is inadvertently installed on the user’s computer without their knowledge the program covertly obtains data from the computer and transmits it to another. Spy-ware can track the websites that the user visits, collect information on the user’s clicks, gather keystrokes and obtain sign in and passwords. Spy-ware can be of a conspicuous nature where the user is somewhat aware of; additional pop-up advertising, slowing down of computer processing, and computer setting changes. The most concerning type of spy-ware has traits that are…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    Accidentally I downloaded the virus called PUP.Chipopo on my Windows 10 computer and it is continuously popping browser screen with the annoying and unwanted ads. How to remove PUP.Chipopo? How to stop irritating ads? Why my computer is performing sluggishly?…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Spyware is a software that aims to gather information about a person or organization without their knowledge, and usually without consent. One opinion of spyware is highlighted in Harlan Coben’s essay, “The Undercover Parent” (2008). It claims that parents should install spyware in their…

    • 974 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    Windows, a much younger operating system, released in 1985, has exponentially grown in popularity ever since. Windows popularity is the biggest reason that it suffers malicious attacks more than any other operating system available. The numerous attacks…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    For example, according to Ellen Goodman, author of Big Brother meets Big Mother and is also so happens to be against the use of spyware, claims, “A company inauspiciously named Bladerunner has begun selling a jacket with a GPS device sewn into the lining.” This invasion of privacy exposes the location of the user of the jacket. Your location is part of your privacy and it should not matter to anyone else unless you want to disclose it to them. A built in GPS into clothing will fully disclose your location without your permission. Another reason why spyware is an invasion of privacy is because even a simple question like “who are you talking to?” or “who are you texting?” or even “who was that?” is a very touchy subject to teens and kids. If these small questions make kids and teens uncomfortable, just imagine how uncomfortable it would be to be tracking, spying and watching them 24/7. In total, the use of spyware is a huge invasion of privacy, even though it is an essential right that is guaranteed to…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The newspaper reported US spies had hacked foreign networks, introducing spyware into millions of computers.…

    • 869 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Identity Theft Outline

    • 1438 Words
    • 6 Pages

    To accomplish this act, most thieves find a way in which they can compromise a computer, they can do this by creating spyware in some sites we want to download files or software, when we try to open email attachments or click on pop-ups when we visit devious websites. This spyware is able to quietly transmit one’s personal information, which can include: Credit card numbers, Bank account numbers, Social Security numbers, usernames and passwords, address books, including email addresses while connected to the…

    • 1438 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The Power of Rootkits

    • 1152 Words
    • 3 Pages

    Cited: Kassner, M. (n.d.). TechRepublic. Retrieved from 10+ things you should know about rootkits: http://www.techrepublic.com/blog/10-things/10-plus-things-you-should-know-about-rootkits/…

    • 1152 Words
    • 3 Pages
    Good Essays