[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/wsr/ - Worksafe Requests


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


For my homework.

I'm a college student and started learning about cyber security three months ago, I am going to make a slide to explain what is spyware with real-world examples/events.

AFAIK spyware is a software installed without knowledge and agreement, and able to access data without user consent., if I'm correct.

Therefore I do think XZ backdoor could be use as an example of spyware, but I'm not sure.
>>
>>1503024

When talking about these terms the first thing you have to be aware about is that they are not exclusive. Pieces of malware can belong to several categories.
A piece of software designed to harm a system in the broadest sense (destruction, spying, theft, ...) is classified as malware.
If it does not destroy anything but phones home info about the user it's spyware. if it installed without the user's knowledge, be it as part of a legit installer or in the background, it's called a trojan (horse). Spyware can - and usually is - a trojan horse.
If it replicates itself and tries to from your system infect others it's a worm.
As far as I would define it the defining factor about spyware is that it phones home private information with the user's consent (NOT KNOWLEDGE!). How it was installed is irrelevant. If you started the installer yourself it is still spyware. If you know about it because it is bundled part of a program that is ESSENTIAL to you it STILL is spyware. Spyware collects and sends info about the user or the system back to a server. At the same time many spyware programs ALSO work as a backdoor, installing and opening a hidden channel for the operator to access the system.
As you see, the terms are not exclusive. Malware can be multiple things at once. Some are dependent on consent, others regard how it was installed, yet again others look at how the installed program acts.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.