Ver:
· http://en.wikipedia.org/wiki/Spyware
· http://www.cert.org/archive/pdf/spyware2005.pdf
Tipo de
software malicioso que al instalarse intercepta o toma control parcial de la
computadora del usuario sin el consentimiento de este último.
http://es.pcisecuritystandards.org
Cualquier
forma de tecnología que se usa para recoger información sobre una persona o
empresa, o información referente a equipos o a redes, sin su conocimiento o
consentimiento. También puede venir implementado en su hardware. Puede capturar
hábitos de navegación, mensajes de correo, contraseñas y datos bancarios para
transmitirlos a otro destino en Internet. Al igual que los virus puede ser
instalado al abrir un adjunto de correo infectado, pulsando en una ventana de
publicidad o camuflado junto a otros programas que instalemos.
http://www.inteco.es/glossary/Formacion/Glosario/
Código
malicioso diseñado habitualmente para utilizar la estación del usuario
infectado con objetivos comerciales o fraudulentos como puede ser mostrar
publicidad o robo de información personal del usuario. [CCN-STIC-400:2006]
Cualquier
forma de tecnología que se usa para recoger información sobre una persona o
empresa, o información referente a equipos o a redes, sin su conocimiento o
consentimiento. También puede venir implementado en su hardware. Puede capturar
hábitos de navegación, mensajes de correo, contraseñas y datos bancarios para
transmitirlos a otro destino en Internet. Al igual que los virus puede ser
instalado al abrir un adjunto de correo infectado, pulsando en una ventana de
publicidad o camuflado junto a otros programas que instalemos.
http://www.alerta-antivirus.es/seguridad/ver_pag.html?tema=S
Software that is
secretly or surreptitiously installed into an information system to gather
information on individuals or organizations without their knowledge; a type of
malicious code. [NIST-SP800-53:2013]
Software that is
secretly or surreptitiously installed into an information system to gather
information on individuals or organizations without their knowledge; a type of
malicious code. [CNSSI_4009:2010]
(D) /slang/
Software that an intruder has installed surreptitiously on a networked computer
to gather data from that computer and send it through the network to the
intruder or some other interested party. (See: malicious logic, Trojan horse.)
[RFC4949:2007]
Malware intended
to violate a users privacy. [NIST-SP800-83:2005]
A program that
monitors a computer to identify spyware and prevent or contain spyware
incidents. [NIST-SP800-83:2005]
Type of malicious
software that when installed, intercepts or takes partial control of the users
computer without the users consent.
https://www.pcisecuritystandards.org/security_standards/glossary.php
Software that
(usually covertly) monitors the use of a computer. A business might use spyware
to capture every keystroke of an employee suspected of fraud; a malicious
website might also attempt to install spyware on every browser that visits that
site in order to keep track of its users and/or capture data from their
computers.
http://www.csoonline.com/glossary/
refers to a broad
category of malicious software designed to intercept or take partial control of
a computer's operation without the informed consent of that machine's owner or
legitimate user. While the term taken literally suggests software that
surreptitiously monitors the user, it has come to refer more broadly to
software that subverts the computer's operation for the benefit of a third
party.
In simpler terms,
spyware is a type of program that watches what users do with their computer and
then sends that information over the Internet. Spyware can collect many
different types of information about a user. More benign programs can attempt
to track what types of websites a user visits and send this information to an
advertisement agency. More malicious versions can try to record what a user
types to try to intercept passwords or credit card numbers. Yet other versions
simply launch popup advertisements.
http://en.wikipedia.org/wiki/Spyware
Unwanted software
that secretly monitors a user's activity, scans for private information or
gives outsiders control of a computer.
http://www.getsafeonline.org/
Programs that
have the ability to scan systems or monitor activity and relay information to
other computers or locations in cyber-space. Among the information that may be
actively or passively gathered and disseminated by Spyware: passwords, log-in
details, account numbers, personal information, individual files or other
personal documents. Spyware may also gather and distribute information related
to the user's computer, applications running on the computer, Internet browser
usage or other computing habits.
Spyware
frequently attempts to remain unnoticed, either by actively hiding or by simply
not making its presence on a system known to the user. Spyware can be
downloaded from Web sites (typically in shareware or freeware), email messages,
and instant messengers. Additionally, a user may unknowingly receive and/or
trigger spyware by accepting an End User License Agreement from a software
program linked to the spyware or from visiting a website that downloads the
spyware with or without an End User License Agreement.
http://www.symantec.com/avcenter/refa.html
Le logiciel espion est
un type de logiciel malveillant qui, une fois installé, intercepte ou prend
partiellement le contrôle dun ordinateur à linsu de son utilisateur.
http://fr.pcisecuritystandards.org/
Programme ou un
sous-programme conçu dans le but de collecter des données personnelles sur ses
utilisateurs et de les envoyer à son concepteur ou à un tiers via Internet ou
tout autre réseau informatique, sans avoir obtenu au préalable une autorisation
explicite et éclairée desdits utilisateurs.
http://www.secuser.com/glossaire/
Temas relacionados