31266 Lecture Notes - Lecture 5: Keystroke Logging, Data Scraping, Adware
Document Summary
They look like legitimate program to your computer"s operating program. We explained adware, spyware and spam ware that can be bundled up with trojans: adware: software that causes pop-up advertisements to appear on your screen, spyware: software that collects personal information about users without their consent. Two common types of spyware are keystroke loggers and screen scrapers: spam ware: that uses your computer as a launch pad for spammers, we discussed elements of a security program, senior management involvement. Risk management including: risk assessment, risk mitigation, continual evaluation. To accept the potential risk and continue operating the it system or to implement controls to lower the risk to an acceptable level. To avoid the risk by eliminating the risk cause and/or consequence (e. g. , shut down the system when risks are identified) To limit the risk by implementing controls that minimize the adverse impact of a threat"s exercising a vulnerability (e. g. , use of supporting, preventive, detective controls)