Download presentation
Presentation is loading. Please wait.
Published byCharleen Shelton Modified over 9 years ago
3
Why Information Security is very important?
4
What is Key Logger ?
5
History of Key Logger
6
Type of Key Logger
7
Process of Key Logger
8
Protect your computer from Key Logger
9
Welcome
10
Why Information Security is very important?
11
To protect from unauthorized to read, write, copy, delete dataTo protect from unauthorized to read, write, copy, delete data 1 To keep your asset information into safe placeTo keep your asset information into safe place 2 To protect from anyone to alter your informationTo protect from anyone to alter your information 3 To protect from stealing username and passwordTo protect from stealing username and password 4 Avoiding from threatAvoiding from threat
12
What is Key Logger ?
13
Hardware device or a software program that records the real time activity of a computer including the keyboard keys they press.
15
History of Key Logger ?
16
Have existed for years History can’t be known Believed that first appeared by government and won’t release any exact date Believed that was used in the early 90’s
17
Type of Key Logger ?
18
There are two types Software-Based Key Logger
19
Hardware-Based Key Logger
20
Process of Key Logger ?
21
Installed secretly on your computer Capture information entered from keyboard such as ID/Password or credit card and save it in a file Access file (via backdoor) and get confidential data or collected information may be transmitted
22
Protect your computer from Key Logger ?
23
Software-Based Key Logger
25
Hardware-Based Key Logger
26
Why information security is very important?Why information security is very important? 1 Purpose and Process of Key LoggerPurpose and Process of Key Logger 2 Protect yourself from Key LoggerProtect yourself from Key Logger 34 Summarize
27
Resources http://compnetworking.about.com/od/netwo rksecurityprivacy/g/keylogger.htm http://compnetworking.about.com/od/netwo rksecurityprivacy/g/keylogger.htm http://www.parxy.com/history- keyloggers.html http://www.parxy.com/history- keyloggers.html http://en.wikipedia.org/wiki/Keystroke_loggi ng http://en.wikipedia.org/wiki/Keystroke_loggi ng http://secudemy.com
28
Q UESTIONS ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.