Presentation is loading. Please wait.

Presentation is loading. Please wait.

Why Information Security is very important? What is Key Logger ?

Similar presentations


Presentation on theme: "Why Information Security is very important? What is Key Logger ?"— Presentation transcript:

1

2

3 Why Information Security is very important?

4 What is Key Logger ?

5 History of Key Logger

6 Type of Key Logger

7 Process of Key Logger

8 Protect your computer from Key Logger

9 Welcome

10 Why Information Security is very important?

11 To protect from unauthorized to read, write, copy, delete dataTo protect from unauthorized to read, write, copy, delete data 1 To keep your asset information into safe placeTo keep your asset information into safe place 2 To protect from anyone to alter your informationTo protect from anyone to alter your information 3 To protect from stealing username and passwordTo protect from stealing username and password 4 Avoiding from threatAvoiding from threat

12 What is Key Logger ?

13  Hardware device or a software program that records the real time activity of a computer including the keyboard keys they press.

14

15 History of Key Logger ?

16  Have existed for years  History can’t be known  Believed that first appeared by government and won’t release any exact date  Believed that was used in the early 90’s

17 Type of Key Logger ?

18  There are two types  Software-Based Key Logger

19  Hardware-Based Key Logger

20 Process of Key Logger ?

21 Installed secretly on your computer Capture information entered from keyboard such as ID/Password or credit card and save it in a file Access file (via backdoor) and get confidential data or collected information may be transmitted

22 Protect your computer from Key Logger ?

23  Software-Based Key Logger

24

25  Hardware-Based Key Logger

26 Why information security is very important?Why information security is very important? 1 Purpose and Process of Key LoggerPurpose and Process of Key Logger 2 Protect yourself from Key LoggerProtect yourself from Key Logger 34 Summarize

27 Resources http://compnetworking.about.com/od/netwo rksecurityprivacy/g/keylogger.htm http://compnetworking.about.com/od/netwo rksecurityprivacy/g/keylogger.htm http://www.parxy.com/history- keyloggers.html http://www.parxy.com/history- keyloggers.html http://en.wikipedia.org/wiki/Keystroke_loggi ng http://en.wikipedia.org/wiki/Keystroke_loggi ng http://secudemy.com

28 Q UESTIONS ?


Download ppt "Why Information Security is very important? What is Key Logger ?"

Similar presentations


Ads by Google