1 / 28

Keylogger | What Is Keylogger And How Does It Work? | Keylogger Explained | Simp

In this presentation, we will understand what is keylogger and how does it work. This video will make you understand how the keylogger program gets into our system and how to detect the keylogger activity in the system, and also keylogger explained how to prevent the keylogger program from harming the system through a keylogger demo.<br><br>The topics covered in this Keylogger slides are:<br>1. What Is a Keylogger?<br>2. Mode of Infection<br>3. Detecting Keylogger Activity<br>4. Types of Keyloggers<br>5. How do Hackers use keylogger data<br>6. Do Mobile Devices get Infected?<br>7. Prevention Measures

Simplilearn
Télécharger la présentation

Keylogger | What Is Keylogger And How Does It Work? | Keylogger Explained | Simp

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Meet June, a corporate worker working in a business firm

  2. Jacob from the security department meets her to brief her about some security protocols.

  3. Click here to watch the video

  4. During the interaction, June informed Jacob about some problems she came across with her system.

  5. My system is exhibiting slow reaction and unusual internet activity.

  6. After learning about June’s problem, Jacob thought of a possibility

  7. You might be facing a “Keylogger” issue.

  8. What is a keylogger? Can you please explain it to me?

  9. What is a keylogger? Can you please explain it to me? To give June a better explanation, Jacob came up with a presentation on “What are Keyloggers?”

  10. What Is a Keylogger ? Types of Keyloggers Mode of Infection Detecting Keylogger Activity Prevention Measures Do Mobile Devices get Infected? How do Hackers use Keylogger data? Agenda of this Session

  11. What Is a Keylogger?

  12. What Is a Keylogger? • A keylogger is a program or tool designed to monitor and keep a tab on the“keystrokes” made on a user’s keyboard. This enables in compromising sensitive data like, bank details, passwords etc.

  13. Mode of Infection

  14. Mode of Infection • Visiting unknown links through emails and textstriggers keylogger activity. • Using pop-ups on social sites compels the user to click it, and this eventually affects the system. • Surfing suspicious sitesand using uncertified software gives way for keyloggers.

  15. Detecting Keylogger Activity

  16. Detecting Keylogger Activity • There are instances ofsystem freeze and delayed reaction time. • There are cases of suspicious internet activitywhere the keylogger may transfer data to its origin. • The keyboard reaction is sluggishdue to the monitoring of the keylogger program.

  17. Types of Keyloggers

  18. Types of Keyloggers

  19. How do Hackers use Keylogger data?

  20. How do Hackers use Keylogger data? • They sensitive government data to the breach of security of a country • By obtaining the data from the target, hackers can use it to “Blackmail” the user • In the case of company data, It can affect the economic value of the company

  21. Do Mobile Devices get Infected?

  22. Do Mobile Devices get Infected? • There are no specific keylogger programs in hand devices, as they use virtual keyboards for input. • By accessing un-certified websites, there are chances of getting infected by the keylogger programs. • If keyloggers get into the device, they may log typing input and monitor files, photos, emails, etc., and share it with cybercriminals.

  23. Preventive Measures

  24. Preventive Measures Use the virtual keyboard to input sensitive information, Bank Details, Login Details etc. Use of Antivirustools and software. Keeping system security protocols updated.

  25. Conclusion

  26. Keylogger Demo

More Related