Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

Slides:



Advertisements
Similar presentations
Internet / Technology Safety Class Internet usage awareness for children, youth and adults.
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Hart District Acceptable Use Policy Acceptable Use Policy.
4 th grade Computer Terminology. Slides o An individual part of certain presentation software that enables users to create highly stylized images for.
Woodland Hills School District Computer Network Acceptable Use Policy.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Little brother is watching you
Security, Privacy, and Ethics Online Computer Crimes.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Business Plug-In B7 Ethics.
SPYWARE  Do you know where your personal information is?
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Internet.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Section 3.1 Describe Internet hardware and software Explain Internet protocols Compare intranets, extranets, and the Internet Section 3.2 Identify URL.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet Hardware Computer Literate.
history, hardware, software, safety, and computer ethics
For Technology Integration and Classroom Management.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
1 After completing this lesson, you will know: What computers need to operate—basic hardware and peripheral devices Why and how to protect your computer.
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
Digital Communication and Networks. Go to this website 10 minutes looking Pick an article Prepare a 5 slide pp Take into account.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Social Networking By: Ning Year 10 HC. Different types of networks  There’s so many ways people can be connected together. In person, s and social.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Woodland Hills School District Computer Network Acceptable Use Policy.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Digital Communication and Networks. When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing.
EDEXCEL BTEC INFORMATION & CREATIVE TECHNOLOGY Unit 1 – The online world.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
HOW TO HACK SOMEONES CELL PHONE CAMERA. Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
Best Free Key logger Download Computer & Internet Monitoring Software.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
TECHNOLOGY IN ACTION. Chapter 3 Using the Internet: Making the Most of the Web’s Resources.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 10: Privacy, Security, and Ethics
Stay Safe While Using The Internet
Unit 11- Computer Networks
What is keystroke logging?
Woodland Hills School District
Presentation transcript:

Keyloggers At Work Jason Clark

History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key loggers came before hardware key logging devices 2

Types of key loggers 2 types of key loggers Software Hardware 3

Software do not require physical access to the user’s computer. can be manually downloaded or secretly downloaded as spyware will upload the logged data to a remote drive or 4

Hardware connects between the user’s keyboard and monitor easy to hide data is stored on a mini hard drive located within the device 5

Why are they being used? Web browsing Social networking, such as FaceBook, Twitter On-line entertainment, such as gaming, YouTube, blogs Private correspondence Instant messaging Skype File sharing over P2P networks 6

The problem… There is potential for invasion of privacy! Gain access to any personal s See web searches See instant messages 7

Is it legal? Short answer, yes.. There is currently no federal law that has been interpreted to prohibit their surreptitious use. 8

Electronic Communications Privacy Act The ECPA could potentially prevent keystroke theft, but thus far the protections it offers have not been extended to keyloggers. 9

For example… Rene v. G.F. Fishers, Inc 10

So is it ethical? …not really! 11

Conclusion Although using key loggers at a place of employment works and is legal, there are more ethical ways to ensure productivity without the risk of invading someone’s privacy. 12

Resources ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Perso nal+Information.htmlhttp:// ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Perso nal+Information.html workplaceprivacy15_CV_N.htmhttp://usatoday30.usatoday.com/money/workplace/ workplaceprivacy15_CV_N.htm regulation-of-keyloggers-in-the-workplacehttp://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act- regulation-of-keyloggers-in-the-workplace