Contents
Summary
After perusing the internet Mr. Anderson’s home laptop started to perform commands on its own, without Mr. Anderson’s input. An ad for Spy-Wiper appeared on his laptop warning him that if he wanted to protect his laptop he had to sign up for the program that would clear his system of any rogue software. When Mr. Anderson arrived at work the following day he discovered that his office computers displayed similar messages from Spy-Wiper. Spy-Wiper was using coercion tactics to intimidate users into signing up for their software, holding the user’s computer hostage until they complied. Spy-Wiper created the threat and supplied the solution.
Internet users have to adjust their web surfing and downloading tactics in order to avoid becoming victims of a spy-ware attack.
History
Spyware has quickly become the most prevalent threat to a computer system. Not too long ago the biggest threat to a computer system was a virus which is small computer program that copies itself from one computer to the next, with the intent of harming the computer system’s data and performance. The other major threat was spam which is seemingly not as catastrophic as a virus. Spam also known as unsolicited bulk email is when a company or person sends out the same email message to a large group of recipients indiscriminately.
Spy-ware is a program that is inadvertently installed on the user’s computer without their knowledge the program covertly obtains data from the computer and transmits it to another. Spy-ware can track the websites that the user visits, collect information on the user’s clicks, gather keystrokes and obtain sign in and passwords. Spy-ware can be of a conspicuous nature where the user is somewhat aware of; additional pop-up advertising, slowing down of computer processing, and computer setting changes. The most concerning type of spy-ware has traits that are
References: Hinde, Stephen. "Spyware: The Spy In The Computer." Computer Fraud & Security 2004.12 (2004): 15-16. Academic Search Premier. Web. 15 June 2013. Awad, Neveen Farag, and Kristina Fitzgerald. "The Deceptive Behaviors That OFFEND US MOST About Spyware." Communications Of The ACM 48.8 (2005): 55-60. Business Source Elite. Web. 15 June 2013. Freeman, Lee A., and Andrew Urbaczewski. "Why Do People Hate Spyware?." Communications Of The ACM 48.8 (2005): 50-53. Business Source Elite. Web. 15 June 2013.