You are on page 1of 20

Key

Key Loggers Loggers


In In
Cyber
Cyber Security Security

1
Key Loggers
in
Cyber Security

Delivered By: Asad S. Baig


Department of Computer Engineering
Bajaj Institute of Technology, Wardha.

Under Supervision of

Prof. S. A. Kale
(Head of Department)
Computer Engineering Department, BIT, Wardha
Index CONTENTS

I. Introduction
II. Types of key loggers
III. Hardware key loggers
IV. Advantage and Disadvantage
V. Software key loggers
VI. Advantage and Disadvantage
VII. Applications
VIII. Precautions
IX. Conclusion
X. References
3
 Introduction

oIt is a type of hardware / software designed to record the keystrokes


done by the user.
o This is one of the most basic software which may seem harmless,
but in the hands of the hacker, it is one of the dangerous software. It
is one of the oldest cyber threats.
o The first key loggers were used by the Soviet Union in the 1970s to
monitor IBM electric typewriters used at embassies based in
Moscow.
oThey would record what was typed and send the information back
to Soviet intelligence via radio signals.
oThat key logger was known as the Selectric bug.

4
TYPES OF KEY LOGGER

Software
Hardware
Key
Key logger
Logger

5
HARDWARE
KEY LOGGER

6
HARDWARE KEY LOGGERS:-

Hardware key loggers are used for keystroke logging, a


method of capturing and recording computer user’s
keystrokes, including sensitive passwords.
Generally, recorded data is retrieved by typing a special
passwords into a compute text editor.
The hardware key loggers plugged in between the keyboard
and computer detects that the password has been typed and
then presents the computer with “typed” data to produce a
menu.

7
HARDWARE KEY LOGGER COMES IN THREE TYPE:-

i. Inline devices that are


attached to the keyboard
cable.
ii. Devices which can be
installed Inside standard
keyboards.
iii. Replacement keyboard that
contain the key logger
already built in .

8
SOME HARDWARE KEY LOGGERS :
 Hardware key logger Stand-Alone
Edition:- A tiny hardware device that
can be attached in between a keyboard and
a computer.
 Hardware key logger Keyboard Edition: It
looks and behave exactly like a normal
keyboard, but they keep a record of all
keystrokes typed
on it.
 Wi-Fi key logger: It is a tiny USB
hardware which allow to stream the
keystrokes from computer to another
devices.

9
How does key logger access to our operating
system ?

10
ADVANTAGES AND DISADVANTAGES
OF HARDWARE KEY LOGGER
Advantages:

• It is undetectable.
• It is not detectable by the anti-virus.
• They are installed in the back of the computer which people
often miss out on.

Disadvantage:
• It can acts as a disadvantage if it is found by someone.
• They are physically detectable

11
SOFTWARE
KEY LOGGERS

12
SOFTWARE KEY LOGGER
It is a program that is designed to record any input entered
by the user from the keyboard. It is also used in organizations
to troubleshoot some problems related to technology.
The key logger is also used by the family to monitor the
activities of the user without the user’s direct knowledge.
 Software key logger has some features which enable
someone to do screen record and more. 
 Software key logger may be better, but it is sometimes
detectable and can also be removed by anti-spyware and it is
also used to record typed passwords, or credit card numbers,
and more.

13
SOFTWARE KEY LOGGER DETECTION
METHOD INCLUDES :-

• The user should perform the two-step authentication.


• The user should have an anti-virus system. It should
enable the user to detect any software key logger.
• The user should look at all the files that have been
installed. If any files look suspicious, the user should
immediately remove that file.

14
ADVANTAGES AND DISADVANTAGES
OF SOFTWARE KEYLOGGER
Advantage :

• It can be installed on a system when the victim opens the


attachment sent in an email.
• It gives the advantage of taking snapshots, recording videos,
and more.
• They are not physically detectable.

 Disadvantage :
• It sometimes gets detected by Anti-spyware.

15
APPLICATIONS OF KEY LOGGERS :-

It is used to record keystrokes entered by the user, therefore


employers to observe employees' computer activities.
 It can be used to take any snapshots of any website that the
user visits, to take some personal information like address,
mobile no., and other data from it.
 It can also be used by the family member to monitor
activities, to make sure their kids are using safe sites and
appropriate stuffs.
 It can also be used for malicious purposes to steal any
confidential information of the user, like credit/debit card
details, account details, ATM pin & etc.

16
PRECAUTIONS:

If you go to a cyber cafe, you should not log in to your


computer, such as a Facebook account, Gmail account. And
don’t even give bank details.
Always use “virtual keyboard” to enter personal details.
Never install a cracked file.
Keep checking your computer or another device after some
time that there is no unwanted application installed in it. If it
happens, then uninstall it immediately.
Use key-logger detector software.
Always use paid antivirus security tools.

17
CONCLUSION:-

A key logger is a type of surveillance software or


hardware device that has capability to record every
keystroke.
A key logger can record instant messages, email,
and any confidential information.
The log file created by the key logger can then be
sent to a specified receiver.
So these are the functions and conclusion of Key
loggers in Cyber Security.

18
References
•  Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging
-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile
Computing. 13 (11): 2566–2579. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233.
• ^ Use of legal software products for computer monitoring, keylogger.org
• ^ "Keylogger". Oxford dictionaries. Archived from the original on 2013-09-11.
Retrieved 2013-08-03.
• ^ Keyloggers: How they work and how to detect them (Part 1), Secure List, "Today,
keyloggers are mainly used to steal user data relating to various online payment systems,
and virus writers are constantly writing new keylogger Trojans for this very purpose."
• ^ Stefan, Deian, Xiaokui Shu, and Danfeng Daphne Yao. "
Robustness of keystroke-dynamics based biometrics against synthetic forgeries." computers
& security 31.1 (2012): 109-121.
• ^ "What is a Keylogger?". PC Tools.
• ^ Caleb Chen (2017-03-20). "Microsoft Windows 10 has a keylogger
enabled by default – here's how to disable it".
 https://www.veracode.com/security/keylogger
 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7928946/
 https://www.techtarget.com/searchsecurity/definition/keylogger
19
THANK
YOU

20

You might also like