1 / 17

Key Loggers

Key Loggers. Morgan, Ashlee, Vadim, John. What Is Key Loggers?.

vanna
Download Presentation

Key Loggers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Key Loggers Morgan, Ashlee, Vadim, John

  2. What Is Key Loggers? • Keystroke logging (often called key logging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

  3. What Is Key Loggers? • Many people consider key loggers just another virus. Key loggers do not damage or corrupt files nor does the program replicate itself. • The most common key loggers will record what you type onto your keyboard and email the files back to the program initiator. • Also unlike viruses, key loggers do have the potential to be incredibly useful.

  4. How does it work? • A key logger program does not require physical access to the user's computer. • It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse.

  5. How does it work? • A key logger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. • The key logger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.

  6. What damage does/can it inflict on a computer/network? • A hardware keylogger can be placed onto the motherboard of a computer, inside the tower or box. • These kinds of key loggers have to be physically placed on the computer and tend to be quite a bit more professional than the software type. • These kinds of key loggers store a file on the hard drive and will send this file out to the program initiator over the internet. • You can get a software keylogger from any kind of download, or email attachment.

  7. What damage does/can it inflict on a computer/network? • These kinds of keylogger store a file on the hard drive and will send this file out to the program initiator over the internet. You can get a software keylogger from any kind of download, or email attachment. • Software keylogger are extremely difficult to find and most often the best way to find one is to have a professional look at the computer.

  8. How does it infect/become loaded on your computer? In other words, how does a computer become infected by this type of spyware? • A keylogger is a device that is installed on your computer and is used to record passwords, keystrokes and other important information.

  9. How does it infect/become loaded on your computer? In other words, how does a computer become infected by this type of spyware? • If you're smart about your computer and you take those few extra steps out of your way to avoid attracting malicious keylogger, then you'll be a lot better off in the end with your identity and bank accounts safely tucked away.

  10. How does it infect/become loaded on your computer? In other words, how does a computer become infected by this type of spyware? • Data is uploaded to a website, database or an FTP server. • The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.

  11. What are some recommended steps to take to avoid this type of spyware? • Most of my ideas seem to have major drawbacks. Linux Live CD can probably avoid software key loggers, but it requires an invasive takeover of the public terminal, and is generally not possible.

  12. What are some recommended steps to take to avoid this type of spyware? • Moreover, since it will need to be a Windows executable, it's not possible for people without a Windows machine available to fill in their passwords ahead of time.

  13. Compile a list of 6-8 vocabulary words that relate to your spyware and define them. • malware (malicious software)- is any program or file that is harmful to a computer user.

  14. Compile a list of 6-8 vocabulary words that relate to your spyware and define them. • Risk analysis-Risk analysis is the process of defining and analyzing the dangers to individuals, businesses and government agencies posed by potential natural and human-caused adverse events.

  15. Compile a list of 6-8 vocabulary words that relate to your spyware and define them. • Remote access-Remote access is the ability to get access to a computer or a network from a remote distance.

  16. Compile a list of 6-8 vocabulary words that relate to your spyware and define them. • Managed security services (MSS)- is a systematic approach to managing an organization's security needs. The services may be conducted in house or outsourced to a service provider.

  17. Source Page • http://www.investigation.appinonline.com/keylogger-infection.html • http://www.helium.com/items/1663694-what-are-the-effects-of-a-keylogger • http://searchmidmarketsecurity.techtarget.com/definition/keylogger • http://searchmidmarketsecurity.techtarget.com/definition/managed-security-services • http://searchmidmarketsecurity.techtarget.com/definition/spam-filter • http://searchmidmarketsecurity.techtarget.com/definition/IPsec • http://searchmidmarketsecurity.techtarget.com/definition/port-scan • http://searchmidmarketsecurity.techtarget.com/definition/unified-threat-management • http://searchmidmarketsecurity.techtarget.com/definition/script-kiddy • http://searchmidmarketsecurity.techtarget.com/definition/remote-access • http://searchmidmarketsecurity.techtarget.com/definition/risk-analysis • http://searchmidmarketsecurity.techtarget.com/definition/malware

More Related