Why Information Security is very important? What is Key Logger ?

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Install Windows XP. The minimum hardware requirements for Windows XP are: Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended) At.
 Existem 3 ajudas: Ajuda do manual Ajuda de um colega Ajuda do professor  Cada equipa pode utilizar as três ajudas
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Johnson Logistics Solutions Office of Systems and Information Technology.
Backups Why Is it important to back up your files? w If you've ever been in a situation in which you've almost completed an important project, only to.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Security Advice Georgie Pepper Campsmount Acadamy.
Internet safety By Lydia Snowden.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
BUSINESS B1 Information Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Junior High Computer Lab.
Window xp installation. Minimum HARDWARE REQUIREMENTS Minimum HARDWARE REQUIREMENTS PC with 300 megahertz or higher processor clock speed recommended;
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
The Computer Environment What is it? The computer environment is the space and elements that you use to be able to work on a computer. This includes ­Hardware:
Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
MUHAMAD SYAFIQ BIN BORHANUDIN SR2211M1.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
An easy to use system that: - Allows us to ensure that your equipment is fit for use and complies with LOLER. - Allows you to see via the Internet where.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
By. Sierra Gillette. Acceptable Use  Abiding by the policies and procedures of other networks that are accessed  Being polite and using appropriate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer Literacy for IC 3 Unit 1: Computing Fundamentals © 2010 Pearson Education, Inc. | Publishing as Prentice Hall.1 Chapter 4: Identifying Software.
Topic 5: Basic Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Basics SystemsViruses Alternative Input Speech.
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Managing Money Workshop The National Autistic Society AGM
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
By: Maxwell Varner.  Description/Background  Uses for Keyloggers  Types of Keyloggers  Prevention Methods  Causes for Concern  Wrap-up  Questions/Discussion.
PUBLIC COMPUTER SAFETY
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Securing Network Servers
By BIJAY ACHARYA Twitter.com/acharya_bijay
Secure Software Confidentiality Integrity Data Security Authentication
National Cyber Security Month
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Operating Systems Security
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Operating Systems Tasks 04/04/2019.
Communicating in the IT Industry
Operating Systems Tasks 05/08/2019.
Presentation transcript:

Why Information Security is very important?

What is Key Logger ?

History of Key Logger

Type of Key Logger

Process of Key Logger

Protect your computer from Key Logger

Welcome

Why Information Security is very important?

To protect from unauthorized to read, write, copy, delete dataTo protect from unauthorized to read, write, copy, delete data 1 To keep your asset information into safe placeTo keep your asset information into safe place 2 To protect from anyone to alter your informationTo protect from anyone to alter your information 3 To protect from stealing username and passwordTo protect from stealing username and password 4 Avoiding from threatAvoiding from threat

What is Key Logger ?

 Hardware device or a software program that records the real time activity of a computer including the keyboard keys they press.

History of Key Logger ?

 Have existed for years  History can’t be known  Believed that first appeared by government and won’t release any exact date  Believed that was used in the early 90’s

Type of Key Logger ?

 There are two types  Software-Based Key Logger

 Hardware-Based Key Logger

Process of Key Logger ?

Installed secretly on your computer Capture information entered from keyboard such as ID/Password or credit card and save it in a file Access file (via backdoor) and get confidential data or collected information may be transmitted

Protect your computer from Key Logger ?

 Software-Based Key Logger

 Hardware-Based Key Logger

Why information security is very important?Why information security is very important? 1 Purpose and Process of Key LoggerPurpose and Process of Key Logger 2 Protect yourself from Key LoggerProtect yourself from Key Logger 34 Summarize

Resources rksecurityprivacy/g/keylogger.htm rksecurityprivacy/g/keylogger.htm keyloggers.html keyloggers.html ng ng

Q UESTIONS ?