By: Maxwell Varner.  Description/Background  Uses for Keyloggers  Types of Keyloggers  Prevention Methods  Causes for Concern  Wrap-up  Questions/Discussion.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Computer Parts Assignment
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Cs238 Lecture 3 Operating System Structures Dr. Alan R. Davis.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
eScan Total Security Suite with Cloud Security
Computer Systems. Note to the student Please make brief notes on the following computer hardware + software components After each section research the.
Essential Computer Concepts. XP New Perspectives on Microsoft Office 2007: Windows XP Edition2 What Is a Computer? A computer is an electronic device.
By, Anish Shanmugasundaram Yashwanth Sainath Jammi.
Cyber Crimes.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
CPU (CENTRAL PROCESSING UNIT): processor chip (computer’s brain) found on the motherboard.
Introduction to Computers
What is a Computer ? What is the application of computer in Our Daily Life ? What is the application of computer in Teaching Field?
How to use a computer and not lose your mind
Why Information Security is very important? What is Key Logger ?
Types of Electronic Infection
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 8 Collecting Data with Forms. Chapter 8 Lessons Introduction 1.Plan and create a form 2.Edit and format a form 3.Work with form objects 4.Test.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Ingredients of Security
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Best Free Key logger Download Computer & Internet Monitoring Software.
Technical Implementation: Security Risks
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Understanding Security Policies
Introduction to Computers
Port Knocking Benjamin DiYanni.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 6 Purchasing and Maintaining a Computer
Topic 5: Communication and the Internet
Jeopardy Security Risks Hardware & Software Computer Types Networking
Chapter 6 System and Application Software
The Internet of Unsecure Things
Computer Security.
How to keep the bad guys out and your data safe
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Chapter 6 System and Application Software
Chapter 6 System and Application Software
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Chapter 6 System and Application Software
What is keystroke logging?
Presentation transcript:

By: Maxwell Varner

 Description/Background  Uses for Keyloggers  Types of Keyloggers  Prevention Methods  Causes for Concern  Wrap-up  Questions/Discussion

 Logs key strokes on most any keyboard  Wide verity of uses  Acceptable  Malicious  Different Types  Hardware based  Software based  No known date of creation  First appeared in the late 80s early 90s  Perry Kivolowitz

 Acceptable uses:  Parent monitoring child’s computer usage  Boss monitoring employee’s computer usage  Government retrieving information pertinent to a crime  Malicious uses:  Cracking passwords  Gaining unauthorized information  Stealing credit card numbers  Reading sent s or messages not intended for public viewing  Retrieving secret names  Stealing account numbers

 Software Based  hypervisor-based  API-based  Form grabbing based  Memory injected based  Kernel-based  Hardware Based  Acoustic  Circuit  In-line  Wireless  BIOS

 Hypervisor-based loggers  Embedded into malware  Runs behind Operating System  Blue Pill  API-based loggers  Simple programs  Hook to keyboard’s API  Notified each time a key is pressed  Easily detected when large amounts of keystrokes are pulled

 Form Grabbing Logger  Confined to web browser forms  Captured when the user clicks “submit”  Done on Host Side Bypasses any security set up by HTTPS websites  Memory Injection  Inject directly into memory  Alter memory tables to capture keystrokes  Used commonly when bypassing Windows UAC (user access control)

 Kernel-based Loggers  Most difficult to program and implement  Allows for greatest discrepancy  Logger acts like keyboard driver  Typically implemented using rootkits

 Types:  Acoustic  Circuit  In-line  Wireless  BIOS  Virtually Undetectable  Begin recording at system startup  Captures keystrokes related to BIOS and system encryption

 Consist of two parts  Microcontroller Processes the data stream between computer and keyboard  Non-volatile memory Stores the information collected even after power to the computer is lost Can range from a few kilobytes (KB) to several gigabytes (GB) in size  Each keystroke typically takes up one byte of space

 Designed to blend in with computer system cabling  Typically resemble a PS/2 connection or a USB inline connection  Circuit attachments can be soldered into keyboards  Move covert  No visual changes to most users  BIOS reprogramming  No extra hardware needed  Store logs on computer’s harddrive

 Acoustic loggers  Key presses make unique sound signature  Frequency analyzer Creates keystroke signatures  Timing and User language combine to make map to letters  Need a fairly long string to ensure proper mapping About 1000 characters

 Wireless loggers  Most keyboards are wireless today  Collect data that is transmitted between keyboard and receiver  Attempts to crack encryption  Can retrieve captured information wirelessly Lower risk of getting caught during device retrieval

 Takes little computer knowledge to install and use most keyloggers  Makes sensitive data vulnerable  Allows for unauthorized access to compute system

 Run malware scans regularly  Some software loggers contain a malware signature  Typing in different windows  Half of password in field, random characters in notepad, finish password in field.  Appears to be garbage in log  Using a non-default keyboard layout  Prevent unauthorized access to computer system.

 Background  Uses for keyloggers  Types of keyloggers  Causes for Concern  Prevention Methods