Tom S. Chan, Southern New Hampshire University
Technical Aspects of Spyware
Definition of Spyware
How Does Spyware Work?
How Does One Get Infected?
Spyware From a Social Perspective
Who Is Doing the Spying and Why?
A Short History of Spyware
The Effects of Spyware
Privacy in the Information Age?
Annoyances to Dubious Practices
Security and Performance Degradations
The Good Spyware?
DoubleClick Inc. Privacy Litigation
Guideline for Business Practices
Countermeasures for Spyware
Ad and Pop-Up Blockers
Firewalls and Intrusion Detection Systems
Safe and Sane Browsing
Computer viruses were first widely seen in the late 1980s. They are mysterious and headline grabbing. Every time a new virus hits, it makes the news if it spreads quickly (Brain, 2004). In the past few years, a new class of malicious programs called spyware has emerged. Spyware is not a virus but behaves more like a Trojan horse. Although no data are damaged, it runs quietly in the background without a user's knowledge and forwards information to the spyware's owner. Spyware is just as malicious as a virus but it is generally less well known. In fact, the ICSA Labs Annual Virus Prevalence Survey (2003) does not tabulate spyware as a separate statistical category. Spyware programs are currently embedded in hundreds of popular shareware and even commercial software products. By the latest ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.