Spyware
Tom S. Chan, Southern New Hampshire University
Spyware From a Social Perspective
Who Is Doing the Spying and Why?
Privacy in the Information Age?
Annoyances to Dubious Practices
Security and Performance Degradations
DoubleClick Inc. Privacy Litigation
Guideline for Business Practices
Firewalls and Intrusion Detection Systems
INTRODUCTION
Computer viruses were first widely seen in the late 1980s. They are mysterious and headline grabbing. Every time a new virus hits, it makes the news if it spreads quickly (Brain, 2004). In the past few years, a new class of malicious programs called spyware has emerged. Spyware is not a virus but behaves more like a Trojan horse. Although no data are damaged, it runs quietly in the background without a user's knowledge and forwards information to the spyware's owner. Spyware is just as malicious as a virus but it is generally less well known. In fact, the ICSA Labs Annual Virus Prevalence Survey (2003) does not tabulate spyware as a separate statistical category. Spyware programs are currently embedded in hundreds of popular shareware and even commercial software products. By the latest ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.