Understanding Spyware, Adware, and Malware: Types, Dangers, and Prevention Methods
This article provides a comprehensive overview of spyware, adware, and malware, highlighting their definitions, how they operate, and the dangers they pose to individuals and organizations. Readers will learn about various forms of malicious infections, including identity theft and security risks. The text also covers effective prevention strategies, featuring well-known antivirus tools such as Ad-Aware, Hi-Jack This, and Windows Defender, to help safeguard against these threats. Stay informed and protect your devices!
Understanding Spyware, Adware, and Malware: Types, Dangers, and Prevention Methods
E N D
Presentation Transcript
Spyware, Adware, and Malware Different Types of Malicious Infections Dangers of Being Infected Prevention Methods
Credentials • A+ Core Certification in Computer Hardware -Repair and Maintenance 2. A+ Core Certification in Microsoft Software -Windows NT/2000/2003 -Windows 98/XP/Vista -Windows .NET • A+ Core Certification in Networking -Repair, management, and administration
What is spyware? • Software that secretly gathers information about a person or organization. • Any software that is designed to take partial or full control of a computer’s operation without the knowledge of the user. • Source: http://dictionary.reference.com/browse/spyware
What is spyware? (con’t) • Generally displays advertisements against your will • Can tracks your online habits and reports them to companies • Can deploy pop-up advertisements • Most popular forms of infection: browser toolbars and loopholes within the OS
What is adware? • Software applications in which advertisements are displayed while the program is running, esp. in pop-up windows or banners, and which is often installed without the user’s knowledge or consent. Also called advertising-supported software. • Source: http://dictionary.reference.com/browse/spyware
What is malware? • Software designed to infiltrate or damage a computer system without the owner’s informed consent • Portmanteau of the words “malicious” and “software” • Only one of the –wares that can be infectious • Can also be considered as ‘contaminating’ as viruses, worms, and trojan horses. • Source: http://en.wikipedia.org/wiki/Malware
What is malware? (con’t) • Biggest malware scandal to date – 2005 Sony BMG CD copy prevention scandal. • Infected computers with “rootkit” software that changed how the Windows platform read all CDs. • Opened security holes in Windows that could not be repaired without reformat/reinstallation.
Dangers of Spyware • Passwords can be obtained by third parties • Personal information can be obtained and sold to third parties, privacy invaded • Identity theft • Reap havoc on your computer, causing you to reformat and reinstall operating system, drivers, and software
Prevention Methods (con’t) • Knowledge!
Recapitulation • Three types of “wares” • Dangers of all three • Prevention methods