Spyware is the latest epidemic security threat. Investigating Factors Affecting

Size: px
Start display at page:

Download "Spyware is the latest epidemic security threat. Investigating Factors Affecting"

Transcription

1 By Younghwa Lee and Kenneth A. Kozar Investigating Factors Affecting of Anti Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1) creating serious problems such as copying and sending personal information, consuming CPU power, reducing available bandwidth, annoying users with endless pop-ups, and monitoring users computer usage. As spyware makes the Internet a riskier place and undermines confidence in online activities, Internet users stop purchasing at online stores a consequence that clearly disrupts e-business. A variety of countemeasures for fighting spyware have been developed, including ant-spyware law enforcement and legislation, antispyware systems, and self-regulatory programs (see Figure 1 and Table 1). An anti-spyware Illustration by Ferruccio Sardella 72 August 2005/Vol. 48, No. 8 COMMUNICATIONS OF THE ACM

2 the Like any IT innovation, determining how best to convince users to adopt it is half the battle. Such is the case for anti-spyware solutions. -Spyware s COMMUNICATIONS OF THE ACM August 2005/Vol. 48, No. 8 73

3 system is the most widely recommended solution, which implements features that prevent, detect, and remedy the problems caused by spyware. The system monitors spyware attacks and automatically identifies and cleanses a system. Studies have identified that more than 80% of current spyware problems could be identified and resolved by using anti-spyware systems. Therefore, spyware experts such as FTC commissioner Orson Swindle strongly encourage Internet users adopt anti-spyware systems. However, contrary to our expectation for a higher adoption rate, only 10% of Internet users have actually done so [2]. Considering that anti-spyware systems effectively shield users from spyware, their low adoption rate continues to be a problem. Several suppositions have been made about this, but an empirical study has yet to be conducted. The goal of this article is to investigate the factors affecting Internet users adoption of an anti-spyware system. Our study seeks to provide a better understanding of an individual s decision to adopt an anti-spyware system, as well as provide a useful guideline on how to increase the adoption rate. The anti-spyware system adoption model was developed based on the theory of planned behavior (TPB) and previous studies of IT Antispyware solutions Types Spyware Anti-spyware law enforcement and legislation Anti-spyware systems Anti-spyware self-regulatory program Table 1. Types of spyware and anti-spyware solutions. innovation adoption. The TPB model has been widely adopted to address computer-related human behaviors because it can successfully capture individual, social, and situational factors impacting an individual s decision [1]. As this model has been effective in explaining and predicting the adoption of new information technologies, it was fitting to use it to examine the adoption of anti-spyware systems. In this context, the model hypothesizes when an individual has a favorable attitude toward an anti-spyware system; when an individual perceives social pressure to adopt or not to adopt an anti-spyware system; and when an individual perceives Classification Adware Keyloggers Trojans Scumware Dialers Browser Hijackers Internet Spyware (I-SPY) Prevention Act of 2004 SPYBLOCK Act Securely Protect Yourself Against Cyber Trespass Act (SPY ACT) Spybot Search and Destroy Spy Sweeper Ad-Aware Spector Pro Spyware Eliminator PestPatrol Spy Catcher AntiSpy AntiSpyware STOPZilla SpywareBlaster Consortium of Antispyware Technology Vendors (COAST) SpyNet SpywareInfo Definition and URL Programs that monitor Internet users online activities to initiate pop-up advertising or other targeted marketing purposes. Programs that capture and record Internet users every keystroke, including personal information and passwords. Malicious programs that appear as harmless or desirable applications, but are designed to cause loss or theft of computer data, or even to destroy the system. Programs that alter the content of Web sites Internet users are accessing, changing the normal links to reroute them to other Web sites. Programs typically used by vendors serving pornography via the Internet. Programs that run automatically every time Internet users start their Internet browser to gather info on the users surfing habits Anti-spyware terms and definitions; there are controlling factors that facilitate or constrain his or Lee her adoption, table 1 (8/05) thus influencing their intention to adopt anti-spyware software. In the same vein, previous studies of IT innovation adoption have identified factors that influence an individual s decision to adopt a new technology [3], including relative advantage, moral compatibility, ease of use, image, visibility, and trialability. These IT innovation factors are well suited for explaining the adoption of an anti-spyware system. In addition, subjective norm, perceived cost, and computing capacity are new factors identified through a focus group study with seven anti-spyware system experts and interviews with 21 anti-spyware system adopters. To increase the explanation power of the TPB 74 August 2005/Vol. 48, No. 8 COMMUNICATIONS OF THE ACM

4 model, researchers have encouraged identifying situation-specific factors and adding them to the model. Figure 2 shows the research model consisting of nine factors believed to significantly influence an individual s adoption of an anti-spyware system. Relative advantage, moral compatibility, and ease of use are classified as attitude factors, subjective norm, visibility and image as social factors, and computing capacity, perceived cost, and trialability as perceived behavioral control factors. The definition of each factor is described in Table 2. To validate the research model, a questionnairebased field survey was conducted with Internet users who have adopted or have Factors Attitude Social Factors Behavioral Control Intention ware system adoption. The insignificance of subjective norm points out that users did not consider pressures from their referents to be important for the anti-spyware adoption decision. For perceived behavioral control, computing capacity and trialability showed a significant effect, while perceived cost did not. The significant impact of computing capacity suggests the more powerful computing environ- Sub- Factors Relative Advantage Moral Compatibility Ease of Use Subjective Norm Visibility Image Computing Capacity Cost Trialability Definition Table 2. Definitions of factors affecting the anti-spyware system adoption. Lee table 2 (8/05) an interest in adopting an anti-spyware system. Some 292 subjects were recruited to the study through advertisements addressing an online privacy community, as well as local and student newspapers. In the end, 212 usable responses were gathered. The average age of the respondents was 27.6 years Gender old. 67% of subjects Female were male, and 65% (n = 70) were industry professionals. They had an ** Ease of Use Relative Advantage ** Moral Compatibility average of nine months Subjective Norm of experience with antispyware system adop- Image * Visibility ** Computing Capacity tion. Data was analyzed * Cost using Partial Least Trialability Squares (PLS). * As illustrated in Figure 3, the model successfully explains an individual s adoption intention (R 2 = 0.83) and actual adoption (R 2 = 0.55) of the anti-spyware system. 1 Six out of nine factors showed a significant influence on anti-spyware system adoption intention. Relative advantage, moral compatibility, visibility, image, computing capacity and trialability were significant factors, whereas ease of use, subjective norm, and perceived cost were not. Out of three attitude factors, relative advantage was the strongest factor affecting the adoption intention. It indicates that people are inclined to adopt an antispyware system when they perceive it as a useful, effective means for keeping their computing environment safe and thus enhancing their task performance. Moral compatibility also showed a significant influence suggesting the stronger the belief that adopting anti-spyware systems is a morally correct behavior to contribute to the overall safety of the Internet environment, the higher the intention to adopt it. The insignificance of ease of use reflects The degree to which an individual believes that using an anti-spyware system would enhance his or her task performance The degree to which the adoption of an anti-spyware system is compatible with one s moral perception The degree to which an anti-spyware system is easy to learn and use The degree to which an individual perceives social pressure to adopt or not to adopt an anti-spyware system from his/her referents The degree to which an individual observes others adoption of an anti-spyware system The degree to which the adoption of an antispyware system enhances one s image as a technical and moral leader among his/her referents. The degree to which an anti-spyware system fits with capacity of one s computer and networks The degree to which an individual perceives purchasing an anti-spyware system is expensive The degree to which it is possible to try using an anti-spyware system before adoption An indication of a person's readiness to use an anti-spyware system Actual anti-spyware system use Male (n = 142 ) *** * ** ** * * Table 3. Results by different gender and age. Lee table 3 (8/05) 1 R 2 = 0.83 means that 83% of individual s adoption intention is explained by antecedents including attitude, social factors, and perceived behavioral control. Age 30 and Below (n = 85 ) ** ** 0.17 ** * * 0.1 * Above 30 (n = 127 ) *** *** * ** * * * Statistically significant at * : p <0.05, ** : p <0.01, *** : p <0.001 that Internet users did not perceive any difficulty in installing and using the system. Most current anti-spyware systems are equipped with user-friendly installation procedures and menus that help the users easily implement and use them. With respect to social factors, Internet users were significantly influenced by visibility and image, but not subjective norm. The significant effect of visibility addresses Internet users tendency of exhibiting herding behavior in adopting a system. That is, when Internet users observe the adoption of antispyware systems by their friends, family, colleagues, and other referent groups, they have more intention to adopt the system. Perceiving the adoption as an opportunity to enhance their image as a technical leader is also a strong motivator of anti-spy- COMMUNICATIONS OF THE ACM August 2005/Vol. 48, No. 8 75

5 Figure 1. Countermeasures of spyware. Legislation ment (such as large RAM, fast CPU, and a high-speed Internet connection) led to a stronger intention to adopt the system. Trialability also showed a significant effect reflecting people trying the system before adopting it. The insignificance of perceived cost suggests the price of an anti-spyware system is not an inhibitor of adoption. Finally, three out of four factors showed significant influence on actual adoption. intention, computing capacity, and trialability were significant, but perceived cost was not. Further analysis was conducted to examine whether the adoption decision is different across gender and age. With respect to gender, all the relationships between adoption factors of male users were the same as those in the original model shown in Figure 3. However, for female respondents, several interesting results were found (see Table 3). Compared to the findings of the original model, subjective norm was found to be significant, while image was not. These findings suggest that women were strongly influenced by mandatory pressure from their referents, whereas they did not highly consider enhancement of their image. In addition, moral compatibility of female adopters was found to be much stronger than for males, indicating women are more sensitive to moral values. Finally, the effect of trialability is much stronger in females than males, suggesting women are more conservative customers. That is, women prefer more hands-on experience with anti-spyware software before actual adoption. To examine the effect of age difference, the original data was divided into two groups: 30 and below and over 30. For the former, major differences from the original model come from moral compatibility and perceived cost. Contrary to the findings of the original model, perceived cost was a significant factor for the younger group while moral compatibility was not. Internet Spyware Prevention Act of 2004 SPYBLOCK Act Securely Protect Yourself Against Cyber Trespass Act s Anti-Adware s Anti-Key Logger s Anti-Trojan Horse s Self-Regulatory Program SpyNet SpywareInfo Attitude Relative Advantage Moral Compatibility Ease of Use Social Influence Subjective Norm Visibility Image Behavioral Control Computing Capacity Cost Trialability Figure 2. The antispyware system adoption model. NO SPYWARE These results indicated the younger adopters did not seriously consider moral value, but were sensitive to the price Lee of an fig anti-spyware 1. (8/05) system in their adoption decision. For the older group, subjective norm was found Intention of of to be significant explaining that the older adopters importantly consider normative beliefs from referents when adopting Lee fig the 2. system. (8/05) STRATEGIC SUGGESTIONS Based on our research findings, this study provides several strategic suggestions on how to increase the adoption of the anti-spyware systems. First, developers should design anti-spyware systems that align better with adopters usefulness and effectiveness expectations. Several reports pointed out that any single antispyware system could not successfully identify and 76 August 2005/Vol. 48, No. 8 COMMUNICATIONS OF THE ACM

6 clean all types of spyware [2]. Therefore, anti-spyware system experts recommend using multiple systems. This is not desirable since this requires the adopters to expend more effort in maintaining multiple systems, not to mention increased cost. Legislators, online users, and developers should work together to create a consensus of the maliciousness of spyware. Most Internet users believe that spyware is an obvious menace that erodes the security of the Internet. However, some users believe that spyware is beneficial in that it provides more effective and personalized customer service, as well as free stateof-the-art applications. They may not have enough knowledge to fully understand the malicious Attitude Relative Advantage Moral Compatibility Ease of Use Social Influence Subjective Norm Visibility Image Behavioral Control Computing Capacity Cost Trialability Figure 3. Research findings. aspects of spyware. Therefore, an ongoing effort to educate Internet users of the problems caused by spyware is necessary. It is also recommended that anti-spyware system developers include explanations that emphasize moral image and innovativeness of adopters in their marketing strategy. For instance, advertisements could explain how an individual s adoption of an anti-spyware system contributes to the improvement of Internet security. Ads could also emphasize that users of anti-spyware systems indicate savvy computer users and industry leaders. To increase the visibility for potential adopters, antispyware system venders should create and manage online discussion databases, anti-spyware communities, and promote the integration of recommendation-to-friends links on their Web sites. As the size of antispyware communities increases, the number of new adopters would also increase due to improved awareness. Anti-spyware developers and marketers should provide more opportunity for users to have hands-on experience with anti-spyware systems. The free versions available on the Internet only provide the most basic security functions, such as determining whether a PC is infected. Removing the spyware would require purchasing an anti-spyware system. Since reducing the perceived uncertainty of potential adopters toward anti-spyware systems is critical for adoption, offering fully functional free anti-spyware systems for a limited time period (say, a 30-day free trial) is recommended. Developers must create multiple versions of antispyware systems to cater to specific user needs, such as financial ability, operating system environments, and *** ** ** * Intention of (R 2 = 0.83) * * * * * desktop or laptop computers. Finally, Lee developers fig 3. (8/05) should tailor their marketing efforts to increase the adoption rate. For example, our findings show an effective way to reach potential women adopters is to provide more trial opportunities. In summary, spyware is the newest threat to betray the trust of Internet users, invade their privacy, and deteriorate their productivity. This problem is exacerbated by the increased number of people online and the increased time they spend online. The creators of spyware programs are also becoming more experienced and agile, which should serve to underscore the importance of promoting anti-spyware research. If we do not provide adequate defenses against spyware, we risk undermining the confidence of Internet users. An anti-spyware system must be perceived as a powerful weapon to counteract the effects of spyware. Ongoing efforts to develop improved anti-spyware systems that meet users needs and influence them to adopt a system should continue to enable building a secure Internet environment. c References 1. Ajzen, I. Attitudes, Personality, and Behavior. Open University Press, Milton- Keynes, England, Kawamoto, D. Few corporations use the anti-spyware tools; news.zdnet.com/ _ html 3. Moore, G.C. and Benbasat, I. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information s Research 2, 3 (1991), Younghwa Lee ([email protected]) is an assistant professor in the School of Business at the University of Kansas, Lawrence, KS. Kenneth A. Kozar is associate dean and a professor of information systems in the Leeds School of Business at the University of Colorado, Boulder ACM /05/0800 $5.00 of (R 2 = 0.55) Statistically significant as *: p<0.05, **: p<0.01, ***: p<0.001 COMMUNICATIONS OF THE ACM August 2005/Vol. 48, No. 8 77

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

An empirical investigation of anti-spyware software adoption: A multitheoretical perspective

An empirical investigation of anti-spyware software adoption: A multitheoretical perspective Available online at www.sciencedirect.com Information & Management 45 (2008) 109 119 www.elsevier.com/locate/im An empirical investigation of anti-spyware software adoption: A multitheoretical perspective

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong K. M. Sam 1, C. R. Chatwin 2, I. C. Ma 3 1 Department of Accounting and Information Management, University of Macau, Macau, China

More information

Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011. NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important

More information

COMPUTER-INTERNET SECURITY. How am I vulnerable?

COMPUTER-INTERNET SECURITY. How am I vulnerable? COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

How To Understand What A Virus Is And How To Protect Yourself From A Virus

How To Understand What A Virus Is And How To Protect Yourself From A Virus Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?

More information

THE GENERATION GAP IN COMPUTER SECURITY:

THE GENERATION GAP IN COMPUTER SECURITY: Introduction The broad adoption of digital media and social networking combined with the increasing amount of sensitive data stored online is making personal computer security more important than ever.

More information

Introduction to Free Computer Tools

Introduction to Free Computer Tools Introduction to Free Computer Tools About me Serge Aubin Technology Advisor / OLS-N Programmer / DBA - 9yrs Web design / Web applications Intranet/Extranet Today s session Terminology Anti-Spyware software

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

Module 5: Analytical Writing

Module 5: Analytical Writing Module 5: Analytical Writing Aims of this module: To identify the nature and features of analytical writing To discover the differences between descriptive and analytical writing To explain how to develop

More information

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files

More information

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey

More information

Spyware and Adware What s in Your Computer?

Spyware and Adware What s in Your Computer? Spyware and Adware What s in Your Computer? Part 1 Welcome to Part 1 of the online course, Spyware and Adware What s in your computer? Are you being bombarded by advertisements on your computer, has your

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

OCT Training & Technology Solutions [email protected] (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

What is Spyware? Daniel Jonasson [email protected]. Johan Sigholm [email protected]. Abstract. 2 Theory.

What is Spyware? Daniel Jonasson danjo620@student.liu.se. Johan Sigholm johsi264@student.liu.se. Abstract. 2 Theory. What is Spyware? Daniel Jonasson [email protected] Johan Sigholm [email protected] Abstract During the last few years the term spyware has become increasingly spread. The definition, though,

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

NewNet 66 Network Security

NewNet 66 Network Security NewNet 66 Network Security Spyware... Understanding the Threat What is Spyware? Spyware is an evolved term. In the mid 90s, it was used to refer to high-tech espionage gadgets. By the late 90s, it became

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy Computing Guide THE LIBRARY www.salford.ac.uk/library How to set up McAfee virus scanning software and become computer virus savvy A virus infection of your workstation can seriously disrupt your learning,

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.] Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless

More information

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+ ABOUT LAVASOFT Company Overview Lavasoft is the original anti-malware company, creating award-winning, free security and privacy software since 1999. Born of the belief that online security should be available

More information

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail

More information

Spyware. Summary. Overview of Spyware. Who Is Spying?

Spyware. Summary. Overview of Spyware. Who Is Spying? Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it

More information

Andree E. Widjaja Jengchung Victor Chen

Andree E. Widjaja Jengchung Victor Chen Andree E. Widjaja Jengchung Victor Chen Institute of International Management National Cheng Kung University, Tainan, Taiwan Andree/Victor 1 Agenda Introduction Cloud Computing Information Security and

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is

More information

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY Hector J. Garcia, Jr., Texas A&M University-Kingsville Dr. Ralph Reilly, University of Hartford Dr. Jack D. Shorter, Texas A&M University-Kingsville,

More information

Putting Web Threat Protection and Content Filtering in the Cloud

Putting Web Threat Protection and Content Filtering in the Cloud Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The

More information

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against

More information

Additional details >>> HERE <<<

Additional details >>> HERE <<< Additional details >>> HERE http://dbvir.com/noadware/pdx/chsd32085/

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive. Basic Computer Security Practices Make backups of important files. Apply patches to the operating system. Use anti-virus software, update definitions very frequently, and run a full virus scan at least

More information

How To Protect Your Small And Medium Sized Business From Security Threats On The Internet

How To Protect Your Small And Medium Sized Business From Security Threats On The Internet WEBROOT SOFTWARE A GUIDE TO SECURITY FOR SMALL & MEDIUM BUSINESS Companion Guide to State of Internet Security: Protecting the SMB Full report available at www.webroot.com Table of Contents Are You an

More information

Ad-Aware Antivirus Overview

Ad-Aware Antivirus Overview Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day

More information

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: [email protected] Due: Tuesday April 5, 2005

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

Introduction (Contd )

Introduction (Contd ) Introduction In 2008, mobile devices continue to rapidly replace desktop computers. Mobile devices create easier ways to communicate and work more efficiently while away from the corporate office. In addition,

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

More information