0% found this document useful (0 votes)
48 views

Key Stroke Loggers: - Maria Ansari - Noureen Shah - Shadab Awan - Nida Wazir

This document defines keyloggers and discusses their uses and prevention. Keyloggers can be hardware or software that records keyboard input to monitor productivity or steal sensitive information like passwords and credit card numbers. Hardware keyloggers physically attach to keyboards while software can be installed remotely as viruses or trojans. Prevention methods include keeping security software up to date, using firewalls, automatic form fillers, alternative keyboard layouts and on-screen keyboards.

Uploaded by

Nida Vaxir
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Key Stroke Loggers: - Maria Ansari - Noureen Shah - Shadab Awan - Nida Wazir

This document defines keyloggers and discusses their uses and prevention. Keyloggers can be hardware or software that records keyboard input to monitor productivity or steal sensitive information like passwords and credit card numbers. Hardware keyloggers physically attach to keyboards while software can be installed remotely as viruses or trojans. Prevention methods include keeping security software up to date, using firewalls, automatic form fillers, alternative keyboard layouts and on-screen keyboards.

Uploaded by

Nida Vaxir
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Key Stroke Loggers

-Maria ansari -Noureen shah -Shadab awan --Nida wazir

Objectives
Define Key logger

Hardware Examples
Software Examples

Prevention

What is Keylogging?
Keystroke logging
A program or hardware device that captures every key depression on the computer Used to monitor employee performance Used to seal private information

CIT 118 WB

Malicious Uses
Besides being used for legitimate purposes, keyloggers can be hardware installed to a computer or software that is used to collect sensitive information. The types of sensitive information include: Usernames & Passwords Credit Card Numbers Person Information such as Name, Address, etc.

Keylogging Hardware
These small devices connect directly on the end of a keyboard to the port on the computer and look rather unassuming.

Keylogging Hardware
At a later time the person who installed the keylogger can come back to retrieve it. They are easily removed. Because your keyboard plugs in the back of your machine, a device like this can go unnoticed for a long time and can even look like they belong there.

The only obstacle for the person installing the hardware is getting access to your computer. Depending whether or not the computer is in a public place it could be rather easy.
6

Software
There are hundreds of keylogger programs available over the internet for download. There are three ways for an attacker to install the software on an unsuspecting computer. 1. Install it from a compact disc or floppy disk. 2. Package the software as a computer virus 3. Gain access to the computer over a network and install surveillance software remotely.
7

Viruses
A simple search of a virus encyclopedia shows 500 examples of keylogging malware.
Installing a Keylogger via virus or trojan horse is an effective and easy way to deliver the program. It could be installed and running on your computer without you even knowing.

Prevention
There are several ways to prevent Keyloggers: Anti-Virus/Spyware & Firewalls Automatic Form Fillers Alternative Keyboard Layouts Onscreen Keyboards

10

Anti-Virus/Spyware & Firewalls


As with any Virus or Spyware you should make sure that you have up-to-date protection. Anti-Virus: Make sure its running and using the latest virus definitions.

Anti-Spyware: Same as your Anti-Virus Software, update regularly.


Firewall: Make sure its active. Its the first line of defense from online intrusions.
11

AutoForm Fillers
A common feature of Web Browsers including Internet Explorer and Firefox.

Works against keyloggers but vulnerable to other security breaches.

12

Alternative Keyboard Layout


Alternative keyboards make captured keystrokes look like nonsense You can customize your own board with Microsoft Keyboard Layout Creator

13

On Screen Keyboards
Software based keyboards are not very effective. Clicks are converted back to keystrokes.

14

On Screen Keyboards
Web-based Keyboards offer more protection and are often found in online games.

15

Summary
Key Loggers record keystrokes:
Legitimate use: Monitor employee productivity, parental control. Illegal uses: Steal passwords, usernames, and other personal/corporate data

There are ways to protect yourself: Be aware of whats installed on your computer Use caution when surfing the internet Keep your computers security software updated
16

Any Questions?

17

You might also like