By Topic

Understanding spyware: risk and response

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

Spyware - programs that monitor a computer user's activities and capture data about the user, storing the information so a third party can access it s a relatively new phenomenon. Spyware countermeasures are just now maturing beyond their initial capabilities, with many choices available to enterprises and individual users. As this field matures, threats and responses are becoming more sophisticated. One major concern has been the time lag between how quickly threats have evolved compared to how quickly counter-measures become available to deal with the threats. Spyware has evolved rapidly because of the profit motivation that spurs it forward. The good news is that countermeasures will grow dramatically in the near future, also because of a strong - and only recently recognized - profit potential. This will help the response catch up to the threat, but only if IT professionals understand how spyware works.

Published in:

IT Professional  (Volume:6 ,  Issue: 5 )