StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Spyware a Key Threat to Network and Information - Essay Example

Cite this document
Summary
WHAT IS SPYWARE? There are numerous viruses that we come across during our work on computers or internet. Spyware is a kind of virus which hides somewhere on the computer hard drive and gathers information about who you are and your activities online. It tries to take over partial control of the computer system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Computer Spyware a Key Threat to Network and Information
Read Text Preview

Extract of sample "Computer Spyware a Key Threat to Network and Information"

WHAT IS SPYWARE? There are numerous viruses that we come across during our work on computers or internet. Spyware is a kind of virus which hides somewhere on the computer hard drive and gathers information about who you are and your activities online. It tries to take over partial control of the computer system. Spyware can also change the settings of a computer system that can have an impact on the internet connection. It slows it down and or less of connectivity altogether. Similarly, the home page can also get change without any warning.

HOW IT WORKS? Since people hardly get to know what is stored on their PCs, spyware can easily enter by force into the computer and keep a record of all that is done online. This poses a serious threat to any individual’s privacy since the software can then pass on anyone’s personal details across the internet. This is one of the reasons, that the use of credit and debit cards online is strictly condemned. Using them online in the presence of spyware on a computer can lead to credit theft.

The simplest kinds of spywares are mostly downloaded on any computer when other free software is downloaded from the internet. More often people ignore going through the license agreement for any software that is downloaded from the internet. A lot many times the license agreement in itself has indications that the software might contain spyware. It normally says that the browsing habits will be sent to the company’s website, which is mostly understood being lawful. In many cases, the data transmitted to company’s via software downloads is used for advertising purposes only, but then again it has no security what-so-ever since spyware can access data on the hard drive and miss-use it.

Spyware not only scan files on the hard drive but also keep a watch on other applications chat programs and even read cookies. In many instances, data collection software is already installed on computer systems for many companies that require building up a database. But these are programs are different from spyware for the reason that they are installed with the consent of clients and prior information. KINDS OF SPYWARE There are different kinds of spywares. Another kind is called adware. Adware is spyware which automatically installs promotional software on the computer.

What this spyware does is that it produces on-display ads, which are normally, in the form of pop-ups. The most horrible kinds of adware are links on the web pages which are takeover links. They take anyone accessing it to a different website from the one that an individual is trying to access. The site the persons take to is the one who normally pays for the adware. Yet another kind is malware. Malware is a short-term for malicious and is designed to harm computers unlike the other spywares that transmit data to other sources or are solely for advertising purposes (Adams, 2006).

Different kinds of malware can also help hackers to attain confidential information like keyed-in passwords, pins, etc (Spyware, 2009). MY PERSONAL EXPERIENCE WITH SPYWARE I believe adware is one of the most common kinds of spyware on the computer systems that individuals are normally unaware of. I have also been a victim of it. I downloaded some antivirus that was said to be free, but when I began to use it, I started getting instant alerts of some inter-related promotion that I didn’t intend to download.

Continuous alerts were annoying. Similarly, once I download a movie torrent, with which some porn clips along with subscription details were downloaded on my system without my consent. It is necessary that individuals know about spyware. As it is rightly said, prevention is better than cure. What is recommended is highly avoiding clicking on pop-up advertisements, which as learnt, are loaded with spyware. Any of the most highly recommended anti-spyware software should be downloaded since they are easily available online.

This will prevent spyware from unknowingly entering a computer. REFERENCES Adams, G. J. (2006). What Is Spyware And What Does It Do? Retrieved October 19, 2011, from Ezine Articles: http://ezinearticles.com/?What-Is-Spyware-And-What-Does-It-Do?&id=910587 What is spyware and what does it do? (2009). Retrieved October 21, 2011, from Yahoo Answers: http://answers.yahoo.com/question/index?qid=20080905085352AAM9NJ1

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Spyware a Key Threat to Network and Information Essay”, n.d.)
Computer Spyware a Key Threat to Network and Information Essay. Retrieved from https://studentshare.org/information-technology/1434175-computer-spyware-a-key-threat-to-network-and
(Computer Spyware a Key Threat to Network and Information Essay)
Computer Spyware a Key Threat to Network and Information Essay. https://studentshare.org/information-technology/1434175-computer-spyware-a-key-threat-to-network-and.
“Computer Spyware a Key Threat to Network and Information Essay”, n.d. https://studentshare.org/information-technology/1434175-computer-spyware-a-key-threat-to-network-and.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Spyware a Key Threat to Network and Information

Spyware and Implementing Network Security

Personal information is secretly recorded with a variety of techniques, including logging keystrokes, recording Internet web browsing history, and scanning documents on the computer's hard disk.... Spyware may collect different types of information.... Some variants attempt to track the websites a user visits and then send this information to an advertising agency.... Additionally, the stakes are even higher if the attacker can steal credit card or bank account information....
19 Pages (4750 words) Essay

Security Is a Major Problem with the Internet

It is also a source of information and entertainment.... Phishing is uses emails to ask for personal information by using the names of reputable organizations for example Citibank etc.... This fools people into giving their personal information to these hackers.... These hackers use this information for financial theft, identity loss, and fraud.... The only way phishing can be avoided is to understand the occurrence of this and think before giving out your password and other personal information online....
3 Pages (750 words) Essay

Spyware and Implementing Network Security to Prevent it

Personal information is secretly recorded with a variety of… Purposes range from overtly criminal (theft of passwords and financial details) to the merely annoying (recording Internet search history for Spyware may collect different types of information.... Some variants attempt to track the websites a user visits and then send this information to an advertising agency.... Additionally, the stakes are even higher if the attacker can steal credit card or bank account information....
20 Pages (5000 words) Essay

Physical Security Related to Computer Systems

Next, the approaches that can be used for the determent of physical attacks and the security measures that can be taken to secure the hardware, network and power supply, have been discussed in detail.... An introduction has been given as to what does physical security means in general and in particular in terms of computer information systems.... Physical security is generally defined as the measures taken to ensure the security of workforce, system devices and equipment, resources, documents and sensitive information stored on physical media (like hardware programs and networks) from damaging proceedings like unauthorized access, fire, espionage, burglary, theft, vandalism, accidental loss or intentional crime that could cause severe harm to an activity, organization or establishment....
8 Pages (2000 words) Term Paper

Unified Threat Management: A Defensive Suite for the 21st Century

A keylogger hidden in a torrent can gather credit card information put into a browser.... “network communications no longer just rely on store-and-forward applications like e-mail.... UTM solutions vary, but in essence, UTM solutions are appliances or software packages that try to provide comprehensive threat management.... It is no longer the 1990s, where the omnipresent and singular concern was… Even individual end-users behind home networks face a bevy of threats from spam, scammers, fraudulent offers, spyware (whether illicit or created by “legitimate” companies), malware, viruses, keyloggers, identity theft, credit and debit card interceptions and fraud, and Making distinctions between these threats is often an exercise in futility: Thus, the birth of the UTM movement....
13 Pages (3250 words) Essay

Developing a Security Plan

nbsp;Information security is the safeguarding of information and information systems.... nbsp;Information security is the safeguarding of information and information systems.... Some areas requiring information security include network security, business stability planning, record security, and information systems auditing.... … The paper "Developing a Security Plan" is a wonderful example of a term paper on information technology....
15 Pages (3750 words) Term Paper

Security of Information in Commercial or Business Organisations

… The paper “Security of information in Commercial or Business Organisations” is a forceful variant of literature review on information technology.... The paper “Security of information in Commercial or Business Organisations” is a forceful variant of literature review on information technology.... efinitionsAccording to Onwubiko and Lenaghan (2007), computer security refers to the protection accorded to computer systems to achieve the basic goals of upholding integrity, confidentiality, availability, non-repudiation, and authenticity of information network resources, including software, hardware, firmware, data or information, and telecommunications....
15 Pages (3750 words) Literature review

Information Security - Risks, Security Plans, and Defensive Measures

As the paper "information Security - Risks, Security Plans, and Defensive Measures" outlines, the aim of providing computer security may differ but it mostly entails protecting computer network information from corruption, hackers, theft, or its preservation.... Without information security, computers, and users' facts and data are at risk.... This statement proves that information technology avoids or catches all possible threats and repairs unavoidable vulnerabilities....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us