In this part . . .
Spyware collects information as relatively harmless as a user’s surfing habits, and as harmful as key logging spyware that records your keystrokes and sends the record to someone else). A corporate user’s Workstation with a working key logger can create liability if it captures a user accessing sensitive information, and the key logger’s owner subsequently compromises that data.
Here I introduce some background regarding the spam and spyware problem and sketch the outline of a battle plan to deal with the threat that they pose to your company. If you’re going to deal with the spam problem for your company, you have a big job in front of you, so I describe the steps you need to take and some of the issues that you’ll run into along the way.
I also help you gain a better understanding of the enemy. Because the people behind spam and spyware are a somewhat elusive lot, I provide some insight into their business plans and some of the dirty tricks they use to accomplish those plans.Spyware collects information as relatively harmless as a user’s surfing habits, and as harmful as key logging spyware that records your keystrokes and sends the record to someone else). A corporate user’s Workstation with a working key logger can create liability if it captures a user accessing sensitive information, and the key logger’s owner subsequently compromises that data.
0 comments:
Post a Comment