Professional Documents
Culture Documents
1
Key Loggers
in
Cyber Security
Under Supervision of
Prof. S. A. Kale
(Head of Department)
Computer Engineering Department, BIT, Wardha
Index CONTENTS
I. Introduction
II. Types of key loggers
III. Hardware key loggers
IV. Advantage and Disadvantage
V. Software key loggers
VI. Advantage and Disadvantage
VII. Applications
VIII. Precautions
IX. Conclusion
X. References
3
Introduction
4
TYPES OF KEY LOGGER
Software
Hardware
Key
Key logger
Logger
5
HARDWARE
KEY LOGGER
6
HARDWARE KEY LOGGERS:-
7
HARDWARE KEY LOGGER COMES IN THREE TYPE:-
8
SOME HARDWARE KEY LOGGERS :
Hardware key logger Stand-Alone
Edition:- A tiny hardware device that
can be attached in between a keyboard and
a computer.
Hardware key logger Keyboard Edition: It
looks and behave exactly like a normal
keyboard, but they keep a record of all
keystrokes typed
on it.
Wi-Fi key logger: It is a tiny USB
hardware which allow to stream the
keystrokes from computer to another
devices.
9
How does key logger access to our operating
system ?
10
ADVANTAGES AND DISADVANTAGES
OF HARDWARE KEY LOGGER
Advantages:
• It is undetectable.
• It is not detectable by the anti-virus.
• They are installed in the back of the computer which people
often miss out on.
Disadvantage:
• It can acts as a disadvantage if it is found by someone.
• They are physically detectable
11
SOFTWARE
KEY LOGGERS
12
SOFTWARE KEY LOGGER
It is a program that is designed to record any input entered
by the user from the keyboard. It is also used in organizations
to troubleshoot some problems related to technology.
The key logger is also used by the family to monitor the
activities of the user without the user’s direct knowledge.
Software key logger has some features which enable
someone to do screen record and more.
Software key logger may be better, but it is sometimes
detectable and can also be removed by anti-spyware and it is
also used to record typed passwords, or credit card numbers,
and more.
13
SOFTWARE KEY LOGGER DETECTION
METHOD INCLUDES :-
14
ADVANTAGES AND DISADVANTAGES
OF SOFTWARE KEYLOGGER
Advantage :
Disadvantage :
• It sometimes gets detected by Anti-spyware.
15
APPLICATIONS OF KEY LOGGERS :-
16
PRECAUTIONS:
17
CONCLUSION:-
18
References
• Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging
-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile
Computing. 13 (11): 2566–2579. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233.
• ^ Use of legal software products for computer monitoring, keylogger.org
• ^ "Keylogger". Oxford dictionaries. Archived from the original on 2013-09-11.
Retrieved 2013-08-03.
• ^ Keyloggers: How they work and how to detect them (Part 1), Secure List, "Today,
keyloggers are mainly used to steal user data relating to various online payment systems,
and virus writers are constantly writing new keylogger Trojans for this very purpose."
• ^ Stefan, Deian, Xiaokui Shu, and Danfeng Daphne Yao. "
Robustness of keystroke-dynamics based biometrics against synthetic forgeries." computers
& security 31.1 (2012): 109-121.
• ^ "What is a Keylogger?". PC Tools.
• ^ Caleb Chen (2017-03-20). "Microsoft Windows 10 has a keylogger
enabled by default – here's how to disable it".
https://www.veracode.com/security/keylogger
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7928946/
https://www.techtarget.com/searchsecurity/definition/keylogger
19
THANK
YOU
20