Spyware
Essay by review • February 23, 2011 • Case Study • 1,653 Words (7 Pages) • 1,200 Views
CASE STUDY:
SPYWARE
Shante Bourne
MIS-5147
There are many PC surveillance tools that allow a user to monitor all kinds of activity on a computer, ranging from keystroke capture, snapshots, email logging, and chat logging just to name a few. These tools are often designed for parents, businesses and similar environments, but can be easily abused if they are installed on your computer without your knowledge. Tools such as these are perfectly legal in most places, but if they are abused, they can seriously violate your privacy. In the more recent years of technology, Spyware has risen as a privacy, security, and functionality issue.
What is Spyware
What exactly is Spyware? Spyware is computer software that is installed on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent (Wikipedia). Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the internet (where it is sometimes called spybot or tracking software), Spyware is programming that is put in someone’s computer secretly gathering information about the user and relaying it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.
While the term Spyware suggests software that secretly monitors the user's behavior, the functions of Spyware extend well beyond simple monitoring and it is legal. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web Browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party. Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs.
Recognizing and Avoiding Spyware
Many experienced Web users have learned how to recognize Spyware, avoid it, and delete it. According to officials at the Federal Trade Commission (FTC), the nation’s consumer protection agency, all computer users should get wise to the signs that Spyware has been installed on their machines, and then take the appropriate steps to delete it (Federal Trade Commission).
The clues that Spyware is on a computer include:
Ð'* a barrage of pop-up ads
Ð'* a hijacked browser вЂ" that is, a browser that takes you to sites other than those you type into the address box
Ð'* a sudden or repeated change in your computer’s Internet home page
Ð'* new and unexpected toolbars
Ð'* new and unexpected icons on the system tray at the bottom of your computer screen
Ð'* random error messages
Ð'* sluggish or downright slow performance when opening programs or saving files
A Spyware program is rarely alone on a computer. An affected machine can rapidly be infected by many other components. Users frequently notice unwanted behavior and degradation of system performance. A Spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic, all of which slow the computer down. Stability issues, such as application or system-wide crashes, are also common. Spyware, which interferes with networking software causes difficulty connecting to the Internet.
In some infections, the Spyware is not even evident. Users assume in those situations that the issues relate to hardware, Windows installation problems, or a virus. Some owners of badly infected systems resort to contacting technical support experts, or even buying a new computer because the existing system "has become too slow". Badly infected systems may require a clean reinstallation of all their software in order to return to full functionality.
The good news is that consumers can take steps to lower their risk of Spyware infections (Federal Trade Commission). Indeed, experts at the FTC and across the technology industry suggest that you:
Ð'* Update your operating system and Web browser software. Your operating system (like Windows or Linux) may offer free software “patches” to close holes in the system that spyware could exploit.
Ð'* Download free software only from sites you know and trust. It can be appealing to download free software like games, peer-to-peer file-sharing programs, customized toolbars, or other programs that may change or customize the functioning of your computer. Be aware, however, that some of these free software applications bundle other software, including spyware.
Ð'* Don’t install any software without knowing exactly what it is. Take the time to read the end-user license agreement (EULA) before downloading any software. If the EULA is hard to find вЂ" or difficult to understand вЂ" think twice about installing the software.
Ð'* Minimize “drive-by” downloads. Make sure your browser security setting is high enough to detect unauthorized downloads, for example, at least the “Medium” setting for Internet Explorer. Keep your browser updated.
Ð'* Don’t click on any links within pop-up windows. If you do, you may install spyware on your computer. Instead, close pop-up windows by clicking on the “X” icon in the title bar.
Ð'* Don’t click on links in spam that claim to offer anti-spyware software. Some software offered in spam actually installs spyware.
Ð'* Install a personal firewall to stop uninvited users from accessing your computer. A firewall blocks unauthorized access to your computer and will alert you if spyware already on your computer is sending information out.
What’s All the Hype About
According to Sunbelt
...
...