1 / 13

Keyloggers At Work

Keyloggers At Work. Jason Clark. History. Believed to have been first used by the government Believed that they were used in the early 1990’s Software key loggers came before hardware key logging devices. Types of key loggers. 2 types of key loggers Software Hardware. Software.

kolton
Download Presentation

Keyloggers At Work

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Keyloggers At Work Jason Clark

  2. History • Believed to have been first used by the government • Believed that they were used in the early 1990’s • Software key loggers came before hardware key logging devices

  3. Types of key loggers 2 types of key loggers • Software • Hardware

  4. Software • do not require physical access to the user’s computer. • can be manually downloaded or secretly downloaded as spyware • will upload the logged data to a remote drive or email

  5. Hardware • connects between the user’s keyboard and monitor • easy to hide • data is stored on a mini hard drive located within the device

  6. Why are they being used? • Web browsing • Social networking, such as FaceBook, Twitter • On-line entertainment, such as gaming, YouTube, blogs • Private E-mail correspondence • Instant messaging • Skype • File sharing over P2P networks Cyberslackers!

  7. The problem… There is potential for invasion of privacy! • Gain access to any personal emails • See web searches • See instant messages

  8. Is it legal? Short answer, yes.. There is currently no federal law that has been interpreted to prohibit their surreptitious use.

  9. Electronic Communications Privacy Act The ECPA could potentially prevent keystroke theft, but thus far the protections it offers have not been extended to keyloggers.

  10. For example… Rene v. G.F. Fishers, Inc

  11. So is it ethical? …not really! Employers claim… “computer surveillance and key logging is importantto ensure productivity” • Website blockers • Remote desktop access • Time audits

  12. Conclusion Although using key loggers at a place of employment works and is legal, there are more ethical ways to ensure productivity without the risk of invading someone’s privacy.

  13. Resources • http://www.securelist.com/en/analysis?pubid=204791931 • http://searchmidmarketsecurity.techtarget.com/definition/keylogger • http://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Issues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Personal+Information.html • http://usatoday30.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm • http://www.parxy.com/history-keyloggers.html • http://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act-regulation-of-keyloggers-in-the-workplace • http://www.ehow.com/list_7252161_problems-keyloggers.html • http://news.cnet.com/8301-13578_3-10099123-38.html

More Related