Guide to Spyware

171 KB | 3 files |  DOC, PDF

Spyware is no longer just an annoying advertising gimmick. Professional criminals use it for identify theft and large-scale scams. This guide will give you and overview of the technical solutions for fighting spyware.

Spyware is becoming more widespread as online attackers and traditional criminals use it as a tool for crimes against individuals, businesses, and governments. Statutes banning spyware exist in a number of states and Congress is considering national legislation.

Spyware can lead to financial loss, as in identity theft and credit card fraud, and it can also reduce consumers' confidence in online safety and their willingness to participate in modern electronic commerce.

One approach to combating spyware is to make it less profitable for the criminals using it. Technical solutions that combat spyware focus on finding, blocking, or removing spyware.

This research guide gives an overview of spyware and outlines some practices to defend against it.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Guide to Spyware.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »
Related IT Downloads

Security3TN Guide to Attribute Based Access Control (ABAC) Definition and Considerations

This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating a variety of attributes. ...  More >>

SecurityTN Digital Signature Standard (DSS)

Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. ...  More >>

Biometric Specifications for Personal Identity Verification

This document describes technical acquisition and formatting specifications for the PIV system, including the PIV Card itself. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.