StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Different Type of Spywares - Lab Report Example

Cite this document
Summary
The paper "Different Type of Spywares" discusses that spyware is the software that transfers vital information surreptitiously from the user’s system to any other intended system. Spyware can attack your system if you install freeware that has spyware as an application package…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Different Type of Spywares
Read Text Preview

Extract of sample "Different Type of Spywares"

There are no free lunches Imagine the previous times full of inconvenience and hassles when we had to stand in what appeared to be never ending queues, to execute any transaction at the bank be it some money transfer or even a minor enquiry. We had to spend hours for booking the railway tickets and for paying our utility bills. Then we jumped onto the era of internet where most of the needs of the day are resolved using internet itself. Few individuals now can be seen doing the transactions standing at the bank. But, as the wise people say “There are no free lunches”, there is a cost associated with this convenience as well. The sole identity that a person has during any online transfer is his password. In case the password to your bank account has been hacked by a smart hacker, after tracking the data from your computer system, he can transfer millions from your account into his account in just a few seconds. To your nightmare, it does not end here. He can sell the vital information, related to your company’s strategy and stored in your system, to the competitor and since the information has been leaked from your system, it will be only you who end up in a jail after losing all the money. All that has been said above is very much plausible and the softwares that are programmed by the hackers to perform all this are called Spywares. Spywares are programmed to obtain the data stored on our computer, and surreptitiously transfer them to the designated computer systems. This data can then be used for any purpose the hacker likes and after that he can sell it at a suitable cost in the grey market. The extent of Spywares can be estimated from the fact that according to the data reported by Earthlink in mid-20041 itself, computers they scanned averaged 26 instances of Spywares per computer. The next question is how do these softwares get into our systems at the first place? The answer to this is they get through mostly with the help of freewares2. Some of the freewares that are available on the internet contain these Spywares as a package. These freewares even have a notification that a spyware will be installed onto the host computer in the fine prints. But, most people sign the licensing agreement without having a proper look at it. Whenever a user installs any such freeware on his machine, the Spywares keeps on transferring the data which, as per claim in these agreements, is used for the marketing information sought by the company who sell you this freeware. These companies claim to generally track the user behavior with the help of this monitoring activity in which the kind of websites visited, the frequency of visits, number of clicks etc. are collated by the company. Apart from this, there is a second way as well in which the spyware can hit your machine. This is possible when the browser of your machine has a loophole that it does not seek permission from the user before installing any of the executables. In such case, the spyware may be installed without the user actually being aware of it. Different Kind of Spywares:- 1. Adware: Adwares are the kind of softwares, that when installed on the machine automatically pops up the advertisement of the marketing company. These are generally used by the companies in order to create recognition for their product in the market. 2. Internet Loggers: These are the one that the companies used to monitor the online behavior of the internet users. They track the behavior by recording online clicks and the kind of websites visited by a user. 3. Chat Loggers: These spyware make a record of all the chats and pass it on the requisite system. Just like chat loggers, email loggers are also available on the internet whose task is to provide a copy of the emails to be passed to the intended systems. 4. Key Stroke Loggers: - These are one of the most dangerous kinds of spywares. They record the key strokes pressed by the user at any point in time. Thus these spywares are capable of collecting any information that is bank account internet passwords, social security number, credit card number etc. 5. Man-in-the-Middle Proxies: - Dangerous software that redirects all Web Surfing activity, including secure connections, to the main-in-the middle proxy. These spywares also have the capability of extracting all the passwords and credit card data. Disadvantages of Spyware:- 1. The most obvious disadvantage is that a spyware has the capability of sending vital data to the requisite system. Most of the users today develop their home based computer in a manner that they keep almost every vital piece of information onto their systems assuming it to be safe and sound, literally unaware of any spyware. Then they end up being a victim of this spywares which can fetch every single bit of information from their systems. 2. The spyware has a capacity of transferring the completely home based work station into a porn server thereby inviting much of a traumatic condition for the end user. 3. Spywares continuously keeps on sending the data using the host’s network and occupy a space in the primary memory. Therefore they have an effect of slowing down the system speed considerably by utilizing not only the bandwidth of the available network but also the primary memory and the CPU utilization for the execution of the software code. Difference between a spyware and a virus:- 1. A major difference between a spyware and a virus is that a virus is installed with a primary motive of hurting the host computer whereas the primary motive of a spyware is to drive the data from the host computer onto the designated computer. 2. Spyware, in most of the cases, is downloaded with the freeware in which user himself grants the authorization to the advertisement company or to the hacker to freely track the key logging or the internet logging activities where as a viruses in most of the cases is installed in background without seeking any approval from the user. 3. A virus generally multiplies itself in the course of time with automatically getting passed on to the different systems whereas there is no such feature seen until now for the spywares. Why can a Spyware be more dangerous than a Virus:- 1. Spywares cannot be removed from the system with the help of antivirus. Antivirus are software codes to detect the presence of latest viruses, when there definitions are kept updated, but are not the agents for the removal of spywares. 2. There is no legal solution available for the cause of spywares, because you have authenticated the use of spywares as per the fine print document, in case you have agreed on the terms and conditions of such freewares. 3. Even firewalls may not be effective in case the freeware is carrier of the spyware because they cannot differentiate between the code of the freeware and a spyware. How to defend against Spywares:- 1. Resort to the policy of there is no free lunches: - Wise people have always said that there are no free lunches. They say that anything that is available in the market for free may not be worth of even taking it. Therefore try not to install freewares onto your machine. In case you are too interested to install it, take a judicious decision by doing a proper market research before installing it. Most of the companies today resort to this policy of ‘There are no free lunches’ in which they do not allow any installation of freewares into their office network by giving proper control to users and administrators. According to my opinion, the policy of ‘There are no free lunches’ is the best for prevention of your system from the lethal act of spywares. 2. There are a few anti spywares available in the market whose functioning is more or less similar to the antivirus packages available in the market. They quarantine a list of spywares, which are stored in their database of anti-spywares, and guide the user to take appropriate step from thereafter. The top three anti-spywares3 available in the market are Spy Sweeper, CounterSpy and Spyware Doctor. 3. Do a proper check of your browser that it does not allow any programs to be installed without seeking your permission. Moreover, it is recommended that you block pop-ups from all the sites in order to reduce the chance of getting attacked by a spyware. In Microsoft’s Internet Explorer, this can be done by clicking on the check box ‘Block pop-ups’ in the Privacy Tab in ‘Internet Options’. A screenshot of the same has been attached below:- Parameters to judge an anti-spyware:- Following are the parameters on which the effectiveness of an anti-spyware can be adjudged:- a. Ease of setup: - It refers to the ease with which a spyware can be installed on the user’s machine. b. Detection Effectiveness: - The effectiveness of the anti-spyware in terms of detecting a spyware from the host computer. c. Removal Effectiveness: - The effectiveness of the anti-spyware in terms of removing the detected spyware from the host computer. d. System Performance: - The user should not suffer from a low system performance after the anti-spyware software has been installed. e. Support Documentation: - Whether enough documents for the installation as well as maintenance of the anti-spyware have been provided or not? Summary Wise people always say “There are no Free Lunches, there is a cost associated with everything”. Even the convenience and hassle free internet banking and online shopping have cost associated with them. A cost in terms of the risk of losing the sensitive data to the hackers who use smart softwares called spywares. Spywares are the softwares that transfer the vital information surreptitiously from the user’s system to any other intended system. A spyware can attack your system if:- 1. You install a freeware that has a spyware as an application package 2. Your browser automatically installs program without seeking your permission and ends up installing a spyware. 3. You click on a pop up and that triggers a program to install a spyware onto your machine. Apart from hackers, spywares are mainly created by the advertisement companies in order to track the online behavior of users. Generally these are not as lethal as the ones created by the hackers, in case the companies do not use the information for anything else apart from marketing but these spywares also turn your machine into a data transmitter for these advertisement agencies, seriously affecting the performance of your home based system. Following steps are advisable in order to prevent your system from spywares:- 1. Don’t fall prey to the attraction of freewares. If you seriously need a freeware, do a proper research that it does not contain any spyware. 2. Check your browser for allowing automatic installations and popup. 3. Install a suitable anti-spyware onto your machine. After proper care has been taken, freely do a number of sensitive transactions without any risk of deadly and dangerous Spywares. Works Cited: Anti-Spyware Software Review. (2009) TopTenReviews. Available from: 24 January 2009. Hardmeier, Sandi. (December 2004) Microsoft Windows, Adware and Bad Things it Does. Available from: 7 February 2009. McDowell, Mindi and Lytle, Matt. (15 August 2007) United States Computer Emergency Readiness Team (US-CERT), Recognizing and Avoiding Spyware. Available from: 31 January 2009. Miller. (23 January 2007) Your PC’s under siege- Viruses, Spyware, Malware Oh My! Tiger Direct News. Available from: 2 February 2009. Spyware. (February 2008) OnGuard Online. Available from: 6 February 2009. Spyware. (October 2008) United States Computer Emergency Readiness Team (US-CERT). Available from: 4 February 2009. Spyware and Adware. (30 January 2009) Fordham University. Available from: 5 February 2009. Spyware in the Enterprise: The Problem and the Solution. (January 2007). Sunbelt Software. Available from: 3 February 2009. Spyware Protection. (June 2005). Tipping Point. Available from: 28 January 2009. What type of Spyware is out there? (September 2006). Wileman Information Technology. Available from: 24 January 2009. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Spyware Lab Report Example | Topics and Well Written Essays - 2250 words”, n.d.)
Spyware Lab Report Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/miscellaneous/1551385-spyware
(Spyware Lab Report Example | Topics and Well Written Essays - 2250 Words)
Spyware Lab Report Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/miscellaneous/1551385-spyware.
“Spyware Lab Report Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/miscellaneous/1551385-spyware.
  • Cited: 0 times

CHECK THESE SAMPLES OF Different Type of Spywares

Network Security Plan

The paper "Network Security Plan" establishes the loopholes different hackers can try to use to access the organization's network.... different forms of validation will be proposed to prevent unauthorized persons from accessing the network.... Laptops, servers, and firewalls need an assessment....
9 Pages (2250 words) Case Study

Internet Security IT Research Paper

While using usernames and passwords for opening sensitive internet accounts, easy to guess type of words or names should be avoided.... While installing third party programs, spywares and malwares can also be get installed in the computer.... different types of viruses, spyware, malware etc can attack the computers through internet....
3 Pages (750 words) Research Paper

Security in Computer Networks

Depending on the security policy of the computer network one can choose and deploy the security protocols at different layers of the network.... The paper "Security in Computer Networks" tells us about threats to security in computer networks and techniques used as a control mechanism....
5 Pages (1250 words) Research Paper

Spyware and Implementing Network Security

Spyware may collect different types of information.... This essay "Spyware and Implementing Network Security" is a compilation of resources that explain what spyware is, how it attacks, and most importantly what you can do to win the war on spyware.... As spyware continues to threaten the stability of corporate infrastructures, it's crucial to understand how this malicious software works and how to defend against it....
19 Pages (4750 words) Essay

Class student dicussions answers

Internet is the prime breeding ground for spywares as we don't really have them on private intranets or local FTP's.... Thus, spywares are web-based and used mostly by hackers or sniffers to steal information.... ustin has provided some more insights on how viruses work, what are their different types and how can you detect if your computer is infected with a virus or not....
2 Pages (500 words) Assignment

Spyware and Viruses

This term paper "Spyware and Viruses" talks about the kind of malware, which is installed on a computer without approval or awareness of the owner with the aim of gathering the private information of the owner.... The user can not know about it and it collects information regarding internet interaction....
17 Pages (4250 words) Term Paper

How Does Spyware Work

The paper "How Does Spyware Work?... points out In the past years, many security issues have emerged.... Though organizations and individuals are continuously adopting strict measures to deal with these challenges, their efforts are less productive against such serious attacks such as spyware programs....
11 Pages (2750 words) Research Paper

E-Commerce Managing Risk and Control

The paper "E-Commerce Managing Risk and Control" is a good example of an information technology coursework.... E-commerce is without a doubt one of the greatest advancement in business practice of all times.... No one would ever have thought that one day; the physical selling would be substituted by mere online business practices that were made a reality by recent technology....
11 Pages (2750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us