What is keystroke logging?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Basics I Course Outline 1: What is a computer? 2: What is an operating system? Using a Desktop Computer 3: What are the basic parts of a desktop.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
SPYWARE  Do you know where your personal information is?
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
Protecting ICT Systems
Configuring the MagicInfo Pro Display
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Cyber crime & Security Prepared by : Rughani Zarana.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Security at NCAR David Mitchell February 20th, 2007.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Computer security By Isabelle Cooper.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
COMPUTER MAIN PARTS SANTIAGO OCAMPO MEJIA. HARDWARE  Or materials set of physical elements of a computer or a computer system.
Computer Security By Duncan Hall.
Digital Literacy: Computer Basics
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
By: Maxwell Varner.  Description/Background  Uses for Keyloggers  Types of Keyloggers  Prevention Methods  Causes for Concern  Wrap-up  Questions/Discussion.
Best Free Key logger Download Computer & Internet Monitoring Software.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Tech Level Cyber Security Lesson 7
Chapter 40 Internet Security.
Chapter 5 Electronic Commerce | Security Threats - Solution
By BIJAY ACHARYA Twitter.com/acharya_bijay
IT Security  .
Unit 4 IT Security.
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security Threats - Solution
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
The Internet of Unsecure Things
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Week 7 - Wednesday CS363.
Principles of Information Technology
Presentation transcript:

What is keystroke logging? A keylogger is a program that runs in the background or hardware, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker Attacker checks files carefully in the hopes of either finding passwords, or possibly other useful information.

What is keystroke logging? Key loggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only Such systems are also highly useful for law enforcement and espionage Keystroke logging can be achieved by both hardware and software means.

The good, the bad and the ugly Good: companies can monitor the productivity of an employee, also useful for software developing. Bad: Espionage Ugly: External hardware can be caught easily and software installation without user noticing is hard.

Hardware key loggers Come in three types: Inline devices that are attached to the keyboard cable Devices which can be installed inside standard keyboards Replacement keyboards that contain the key logger already built-in

Some hardware keyloggers Hardware KeyLogger Stand-alone Edition a tiny hardware device that can be attached in between a keyboard and a computer. Hardware KeyLogger Keyboard Edition looks and behaves exactly like a normal keyboard, but it keeps a record of all keystrokes typed on it. KeyGhost Hardware Keylogger a tiny hardware device that can be attached in between a keyboard and a computer. KeyKatcher Keystroke Logger a tiny hardware device that can be attached in between a keyboard and a computer.

Keylogger The Hardware KeyLogger™ Stand-alone Edition is a tiny hardware device that can be attached in between a keyboard and a computer. It keeps a record of all keystrokes typed on the keyboard. The recording process is totally transparent to the end user. The keystrokes can only be retrieved by an administrator with a proper password. BEFORE AFTER

Hardware KeyLoggerTM Keyboard Edition The Hardware KeyLogger™ Keyboard Edition looks and behaves exactly like a normal keyborad, but it keeps a record of all keystrokes typed on it. The recording process is totally transparent to the end user. The keystrokes can only be retrieved by an administrator with a proper password.

KeyKatcher The KeyKatcher is a hardware device to log activity as it is performed on the keyboard. The device works with any PS/2 keyboard and is not dependant on the operating system because there is not any software required for the manufacture to product to interact with the hardware. The KeyKatcher records up to 32,000 bytes (keystrokes) in the 33k model or 64,000 bytes (key strokes) in the 64k model. Even if the device is unplugged from the keyboard it will still remember EVERYTHING and you wont lose a single keystroke.

Interacting with keylogger Interacting with the Keystroke logger is simple, it can be done from any PS/2 compatible keyboard/computer. You can take it off the computer it is on to examine the data on another computer or perform the audit from that computer. Enter into a text program. Type the passphrase which was set, the menu will be displayed, you can navigate through the menus by entering typing in the number corresponding with the command.

Other approaches There are other approaches to capturing info about what you are doing. Some keyloggers capture screens, rather than keystrokes. Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

Software Key Logging Easy to implement – code is relatively normal. Hard to install – user can notice the presence of it.

Problems with installing a Key Logger An attacker that connects to the target to download the keystrokes risks being traced. A code that sends the information to an email address risks exposing the attacker.

Secure ways to install a key logger Program can be distributed through viruses and/or worms and attacker can claim to victim of it if s/he is caught. Use cryptography to prevent others from discovering the content and later decode it later.

Examples of key loggers Magic Lantern developed by the FBI is installed remotely via email attachment. All in One Keylogger Spy Software sends encrypted logs to desired email tracks all users activity

Examples of key loggers (cont.) Wiretap Pro specializes in Internet monitoring records chats, emails, web sites visited Ardamax Keylogger monitors user activity in an encrypted way data is stored as text or web page used to maintain backups or monitor kids.

Defending from a key logger Have our computer up to date with: Keep net firewall on Anti-spywares Anti-viruses Check USB ports and PS/2 Check programs installed Also we can maintain a practice of using only the soft keyboard (on screen). However is not completely secure.

References http://www.ardamax.com/ http://www.keyghost.com/ http://www.keykatcheruk.co.uk/ http://www.relytec.com/ http://www.securitystats.com/ http://en.wikipedia.org/Key_logger http://www.windowsnetworking.com/ http://www.wiretappro.com/