Abstract

This chapter provides an overview of spyware; it is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host. Spyware is unauthorized software installed on a computer system, which somehow “spies” or gathers information about an individual or his computer and delivers it to someone else. It runs hidden in the background and can monitor Web surfing, capture keystrokes typed on the keyboard, gather information from the hard drive, and more. The majority of spyware is not inherently designed to harm the computer. The intent of spyware is to monitor actions and behaviors on the computer and return that information to someone else, who can use it to predict what will interest the user so that products and services can be sold to him. One of the most common ways to get spyware on a system is by installing software from questionable sources. Many freeware and shareware applications, or Peer-to-Peer (P2P) file-sharing programs, install spyware applications in the background. Some provide notification about the software buried within the legalese of the End User License Agreement (EULA), but few users read the EULA in its entirety.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.