Question: Case Study 1-3: Defining Spyware Harmful spyware is not always easy to identify. This is because not all software that performs one of the functions

Case Study 1-3: Defining Spyware Harmful spyware is not always easy to identify. This is because not all software that performs one of the functions listed is necessarily spyware. With the proper notice, consent, and control, some of these same technologies can provide valuable benefits. For example, monitoring tools can help parents keep track of the online activities of their children, and remote control features allow support technicians to remotely diagnose computer problems. Organizations that distribute software that performs these functions are considered legitimate businesses. Organizations that cause pop-up advertisements to appear on Web pages likewise consider themselves to be legitimate. Whereas there is no question about the creators of a virus performing a malicious act, the line between legitimate businesses that use spyware-like technology and malicious spyware operators is sometimes blurred. This makes it difficult to pinpoint the perpetrators of malicious spyware and to defend against them. How would you differentiate between malicious spyware and legitimate spyware? Create a checklist of items that would identify software as either malicious or legitimate. Now use the Internet to locate three examples of legitimate spyware and then apply your checklist to them. Did your checklist accurately identify these examples as legitimate spyware? Why or why not? Write a one-page paper about your results.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!