The University of Tennessee
A-Z Index  /  WebMail  /  Dept. Directory
 

IT Security Awareness Training

Topic 4: Spyware

Spyware movie still

To watch the video, click on the icon below that matches your media player. If you don't have a player, go to our download page. If you need a video with text captions, please visit our text-captioned page.

flash player icon
quicktime player icon
real player icon
windows media player icon
Spyware programs are programs written with malicious intent. They can be as simple as annoying pop-ups that are meant to distract you or attract you to malicious sites. They can be software that tracks your web surfing habits or logs all the keystrokes you make with the intent of capturing your login id and passwords.

To protect your system from spyware:
   Try to stay on known or trusted Internet sites. These sites are generally well monitored by their administrators and will rarely have spyware software embedded into the site.
   Before surfing the Web, log into your account as someone other than "administrator". This would be an account on your system that has restricted privileges. This will lessen the possibility of a hacker gaining control of your computer and accessing personal information.
   Enable browser security. Browsers such as Internet Explorer, Mozilla, Netscape, and Safari all have Internet security features built into them.
   Disable the browser from automatically downloading cookies (which can be used for malevolent intent).
   Download programs or software only from trusted sites.
   Never click on unwanted pop-ups. Instead, shut them down by clicking on the red "X" in the upper right hand corner of the pop-up window.
   Install anti-spyware software; keep it updated as you do your anti-virus software; and run it regularly. Several packages such as SpyBot and AdAware are free and do a great job at protecting your system from unwanted and annoying spyware software.
   Install a pop-up blocker. These can be obtained from Yahoo or Google.


Overall, implementing these methods will provide another valuable layer of protection for your system.

Interested in Exploring More?

Here are some links with more information for you to consider:
Dell Computer support page about Spyware
PC World's Spyware Help Center
Microsoft video about Spyware

Here are some links to Anti-Spyware Software Resources and download sites:
List of dubious anti-Spyware software
Removal tools if you already have Spyware/AdWare
http://www.download.com
Help Desk Student Customer Support Spyware page
UT Anti-Virus Site


IT Security Awareness Training Topics
Virus Protection
Passwords
Storing Sensitive Data
Spyware
Email Hoaxes

Virus Protection

Passwords

Storing Sensitive Data

Spyware

Email Hoaxes


Desktop Security
Phishing
Firewalls
File Sharing
 

Desktop Security

Phishing

Firewalls

File Sharing and Copyright

 



If you need any assistance, email aware@itc.utk.edu for help.

Click here to go back to the main Security Awareness Training page.