By: ramen swarly
In layman's term, computer "spyware" can simply be defined as a legitimate but annoying programs that has been installed on the user's computers with or without their consent. Since the idea of spyware is simply to fetch information, computer spyware exists because of the idea that information has value. Usually computer spyware runs secretly in the background of the users' computers and covertly gathers users information and spreads it without the users knowledge.
In practice however, there is nothing wrong with computer spyware operating in the background as long as the user knows that it is happening. Unfortunately, most users are unaware of the fact that they have software on their computers that tracks and reports on their Internet usage. Once installed the computer spyware monitors the activities of the user on the Internet and transmits that information in the background to the third parties like advertising companies.
All in all the data collected by computer spyware is often sent back to the marketing company, resulting in display of specific advertisements, pop-up ads and installing toolbars showed when users visit specific web sites. In this sense, computer spyware programs emerged as technologies used to obtain valuable customer information.
Computer spyware may occupies resources of the computer that affects or alters the functions of existing application, in that sense it poses several risks. Commonly, the presence of spyware drains your computer's properties, slow your Internet connection, spy on your surfing, and even forcibly redirect your Web browser. Its programs range from annoying to the dangerous, including keyboard loggers and screen capture applications that can steal passwords and other sensitive information.
The programs are sometimes bundled in with shareware or freeware programs that can be downloaded from the Internet. Another setback of computer spyware is compromising the user's privacy by transmitting information about the user's behaviors. Furthermore, computer spyware detracts the usability and stability of the computing environment of the user. It also has the ability to introduce new security vulnerabilities to the infected host by downloading software updates. When the occurrence of computer spyware is widespread possible vulnerabilities put numerous amounts of computer risks.
Although the research community has spent limited time and effort on understanding the nature and extent of the spy ware program, computer experts and network practitioners agree that computer spyware is a real problem with increasingly negative effects. One particular proof of this conclusion comes from the Emerging Internet Research states that one among three companies has detected spyware on their system. Likewise, Earthlink research found out the occurrence of computer spyware in more than 2 million computers connected in their network with a total of 12.1 million various types of computer spy. Subsequent development of computer spyware technologies in combination will affect system and network capacity.
As an outmost consequence, a disastrous situation may occur if a network is seriously overloaded with different types of spyware distributed by computerized systems that are controlled by malicious people, in effect computer spyware may render further installations of viruses resulting to network breakdown.
As noted, since computer spyware gathers user information through the user's Internet connection usually for advertising purposes and considering the practices of some companies in order to ensure that their spyware cannot be easily removed, the best option to avoid computer spyware is prevention. You have to ensure that your system cannot and will not install programs automatically over the Internet or launch them automatically from email.
Moreover make sure that your operating system is fully patched against any known security vulnerabilities. And of course the best protection is enough knowledge of the risks of spyware and it works.
About the Author
(ArticlesBase SC #2229042)
Article Source: http://www.articlesbase.com/ - Fundamentals and Risks of Computer Spyware
No comments:
Post a Comment