Ver:
·
http://en.wikipedia.org/wiki/Spyware
·
http://www.cert.org/archive/pdf/spyware2005.pdf
Tipo de
software malicioso que al instalarse intercepta o toma control parcial de la
computadora del usuario sin el consentimiento de este último.
http://es.pcisecuritystandards.org
Cualquier
forma de tecnología que se usa para recoger información sobre una persona o
empresa, o información referente a equipos o a redes, sin su conocimiento o
consentimiento. También puede venir implementado en su hardware. Puede capturar
hábitos de navegación, mensajes de correo, contraseñas y datos bancarios para
transmitirlos a otro destino en Internet. Al igual que los virus puede ser
instalado al abrir un adjunto de correo infectado, pulsando en una ventana de
publicidad o camuflado junto a otros programas que instalemos.
http://www.inteco.es/glossary/Formacion/Glosario/
Código
malicioso diseñado habitualmente para utilizar la estación del usuario
infectado con objetivos comerciales o fraudulentos como puede ser mostrar
publicidad o robo de información personal del usuario. [CCN-STIC-400:2006]
Cualquier
forma de tecnología que se usa para recoger información sobre una persona o
empresa, o información referente a equipos o a redes, sin su conocimiento o
consentimiento. También puede venir implementado en su hardware. Puede capturar
hábitos de navegación, mensajes de correo, contraseñas y datos bancarios para
transmitirlos a otro destino en Internet. Al igual que los virus puede ser
instalado al abrir un adjunto de correo infectado, pulsando en una ventana de
publicidad o camuflado junto a otros programas que instalemos.
http://www.alerta-antivirus.es/seguridad/ver_pag.html?tema=S
Software that is secretly or
surreptitiously installed into an information system to gather information on
individuals or organizations without their knowledge; a type of malicious code.
[NIST-SP800-53:2013]
Software that is secretly or
surreptitiously installed into an information system to gather information on
individuals or organizations without their knowledge; a type of malicious code.
[CNSSI_4009:2010]
(D) /slang/ Software that an
intruder has installed surreptitiously on a networked computer to gather data
from that computer and send it through the network to the intruder or some
other interested party. (See: malicious logic, Trojan horse.) [RFC4949:2007]
Malware intended to violate
a users privacy. [NIST-SP800-83:2005]
A program that monitors a
computer to identify spyware and prevent or contain spyware incidents. [NIST-SP800-83:2005]
Type of malicious software
that when installed, intercepts or takes partial control of the user’s computer
without the user’s consent.
https://www.pcisecuritystandards.org/security_standards/glossary.php
Software that (usually
covertly) monitors the use of a computer. A business might use spyware to
capture every keystroke of an employee suspected of fraud; a malicious website
might also attempt to install spyware on every browser that visits that site in
order to keep track of its users and/or capture data from their computers.
http://www.csoonline.com/glossary/
refers to a broad category
of malicious software designed to intercept or take partial control of a
computer's operation without the informed consent of that machine's owner or
legitimate user. While the term taken literally suggests software that
surreptitiously monitors the user, it has come to refer more broadly to
software that subverts the computer's operation for the benefit of a third
party.
In simpler terms, spyware is
a type of program that watches what users do with their computer and then sends
that information over the Internet. Spyware can collect many different types of
information about a user. More benign programs can attempt to track what types
of websites a user visits and send this information to an advertisement agency.
More malicious versions can try to record what a user types to try to intercept
passwords or credit card numbers. Yet other versions simply launch popup
advertisements.
http://en.wikipedia.org/wiki/Spyware
Unwanted software that
secretly monitors a user's activity, scans for private information or gives
outsiders control of a computer.
http://www.getsafeonline.org/
Programs that have the
ability to scan systems or monitor activity and relay information to other
computers or locations in cyber-space. Among the information that may be
actively or passively gathered and disseminated by Spyware: passwords, log-in
details, account numbers, personal information, individual files or other
personal documents. Spyware may also gather and distribute information related
to the user's computer, applications running on the computer, Internet browser
usage or other computing habits.
Spyware frequently attempts
to remain unnoticed, either by actively hiding or by simply not making its
presence on a system known to the user. Spyware can be downloaded from Web
sites (typically in shareware or freeware), email messages, and instant messengers.
Additionally, a user may unknowingly receive and/or trigger spyware by
accepting an End User License Agreement from a software program linked to the
spyware or from visiting a website that downloads the spyware with or without
an End User License Agreement.
http://www.symantec.com/avcenter/refa.html
Le logiciel espion est
un type de logiciel malveillant qui, une fois installé, intercepte ou prend
partiellement le contrôle d’un ordinateur à l’insu de son utilisateur.
http://fr.pcisecuritystandards.org/
Programme ou un
sous-programme conçu dans le but de collecter des données personnelles sur ses
utilisateurs et de les envoyer à son concepteur ou à un tiers via Internet ou
tout autre réseau informatique, sans avoir obtenu au préalable une autorisation
explicite et éclairée desdits utilisateurs.
http://www.secuser.com/glossaire/