Spyware

Tom S. Chan, Southern New Hampshire University

Introduction

Technical Aspects of Spyware

Definition of Spyware

How Does Spyware Work?

How Does One Get Infected?

Spyware From a Social Perspective

Who Is Doing the Spying and Why?

A Short History of Spyware

The Effects of Spyware

Privacy in the Information Age?

Annoyances to Dubious Practices

Security and Performance Degradations

The Good Spyware?

Legal Ramifications

DoubleClick Inc. Privacy Litigation

Guideline for Business Practices

Countermeasures for Spyware

Cookie Screeners

Ad and Pop-Up Blockers

Antispyware Scanners

Firewalls and Intrusion Detection Systems

Safe and Sane Browsing

Conclusion

Glossary

Cross References

References

INTRODUCTION

Computer viruses were first widely seen in the late 1980s. They are mysterious and headline grabbing. Every time a new virus hits, it makes the news if it spreads quickly (Brain, 2004). In the past few years, a new class of malicious programs called spyware has emerged. Spyware is not a virus but behaves more like a Trojan horse. Although no data are damaged, it runs quietly in the background without a user's knowledge and forwards information to the spyware's owner. Spyware is just as malicious as a virus but it is generally less well known. In fact, the ICSA Labs Annual Virus Prevalence Survey (2003) does not tabulate spyware as a separate statistical category. Spyware programs are currently embedded in hundreds of popular shareware and even commercial software products. By the latest ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.