Key Stroke Loggers: - Maria Ansari - Noureen Shah - Shadab Awan - Nida Wazir
Key Stroke Loggers: - Maria Ansari - Noureen Shah - Shadab Awan - Nida Wazir
Objectives
Define Key logger
Hardware Examples
Software Examples
Prevention
What is Keylogging?
Keystroke logging
A program or hardware device that captures every key depression on the computer Used to monitor employee performance Used to seal private information
CIT 118 WB
Malicious Uses
Besides being used for legitimate purposes, keyloggers can be hardware installed to a computer or software that is used to collect sensitive information. The types of sensitive information include: Usernames & Passwords Credit Card Numbers Person Information such as Name, Address, etc.
Keylogging Hardware
These small devices connect directly on the end of a keyboard to the port on the computer and look rather unassuming.
Keylogging Hardware
At a later time the person who installed the keylogger can come back to retrieve it. They are easily removed. Because your keyboard plugs in the back of your machine, a device like this can go unnoticed for a long time and can even look like they belong there.
The only obstacle for the person installing the hardware is getting access to your computer. Depending whether or not the computer is in a public place it could be rather easy.
6
Software
There are hundreds of keylogger programs available over the internet for download. There are three ways for an attacker to install the software on an unsuspecting computer. 1. Install it from a compact disc or floppy disk. 2. Package the software as a computer virus 3. Gain access to the computer over a network and install surveillance software remotely.
7
Viruses
A simple search of a virus encyclopedia shows 500 examples of keylogging malware.
Installing a Keylogger via virus or trojan horse is an effective and easy way to deliver the program. It could be installed and running on your computer without you even knowing.
Prevention
There are several ways to prevent Keyloggers: Anti-Virus/Spyware & Firewalls Automatic Form Fillers Alternative Keyboard Layouts Onscreen Keyboards
10
AutoForm Fillers
A common feature of Web Browsers including Internet Explorer and Firefox.
12
13
On Screen Keyboards
Software based keyboards are not very effective. Clicks are converted back to keystrokes.
14
On Screen Keyboards
Web-based Keyboards offer more protection and are often found in online games.
15
Summary
Key Loggers record keystrokes:
Legitimate use: Monitor employee productivity, parental control. Illegal uses: Steal passwords, usernames, and other personal/corporate data
There are ways to protect yourself: Be aware of whats installed on your computer Use caution when surfing the internet Keep your computers security software updated
16
Any Questions?
17