280 likes | 716 Views
In this presentation, we will understand what is keylogger and how does it work. This video will make you understand how the keylogger program gets into our system and how to detect the keylogger activity in the system, and also keylogger explained how to prevent the keylogger program from harming the system through a keylogger demo.<br><br>The topics covered in this Keylogger slides are:<br>1. What Is a Keylogger?<br>2. Mode of Infection<br>3. Detecting Keylogger Activity<br>4. Types of Keyloggers<br>5. How do Hackers use keylogger data<br>6. Do Mobile Devices get Infected?<br>7. Prevention Measures
E N D
Jacob from the security department meets her to brief her about some security protocols.
During the interaction, June informed Jacob about some problems she came across with her system.
My system is exhibiting slow reaction and unusual internet activity.
After learning about June’s problem, Jacob thought of a possibility
What is a keylogger? Can you please explain it to me? To give June a better explanation, Jacob came up with a presentation on “What are Keyloggers?”
What Is a Keylogger ? Types of Keyloggers Mode of Infection Detecting Keylogger Activity Prevention Measures Do Mobile Devices get Infected? How do Hackers use Keylogger data? Agenda of this Session
What Is a Keylogger? • A keylogger is a program or tool designed to monitor and keep a tab on the“keystrokes” made on a user’s keyboard. This enables in compromising sensitive data like, bank details, passwords etc.
Mode of Infection • Visiting unknown links through emails and textstriggers keylogger activity. • Using pop-ups on social sites compels the user to click it, and this eventually affects the system. • Surfing suspicious sitesand using uncertified software gives way for keyloggers.
Detecting Keylogger Activity • There are instances ofsystem freeze and delayed reaction time. • There are cases of suspicious internet activitywhere the keylogger may transfer data to its origin. • The keyboard reaction is sluggishdue to the monitoring of the keylogger program.
How do Hackers use Keylogger data? • They sensitive government data to the breach of security of a country • By obtaining the data from the target, hackers can use it to “Blackmail” the user • In the case of company data, It can affect the economic value of the company
Do Mobile Devices get Infected? • There are no specific keylogger programs in hand devices, as they use virtual keyboards for input. • By accessing un-certified websites, there are chances of getting infected by the keylogger programs. • If keyloggers get into the device, they may log typing input and monitor files, photos, emails, etc., and share it with cybercriminals.
Preventive Measures Use the virtual keyboard to input sensitive information, Bank Details, Login Details etc. Use of Antivirustools and software. Keeping system security protocols updated.