why information security is very important? what is key logger ?

Post on 13-Jan-2016

218 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

BUILD BRIGHT UNIVERSITY KINGDOM OF CAMBODIANATION RELIGION KING

Information Security Forum

Understanding about Key Logger

Prepared By Year 4 Semester 1 Student

Promotion 11

Skill Database

Instructor By Pro. Ou Phannarith

Year 2013-2014

Group Member

Mr. Chea Lay

Mr. Chun Ratha Mr. Chheng Udam Mr. Pho Sophea

Why Information Security is very important?

What is Key Logger ?

History of Key Logger

Type of Key Logger

Process of Key Logger

Protect your computer from Key Logger

Welcome

Why Information Security is very important?

• Why Information Security is very important?

• To protect from unauthorized to read, write , copy , delete data1

• To keep your asset information into safe place2

• To protect from anyone to alter your information3

• To protect from stealing username and password4

• Avoiding from threat5

What is Key Logger ?

Hardware device or a software program that records the real time activity of a computer including the keyboard keys they press.

• What is Key Logger?

• What is Key Logger?

History of Key Logger ?

• History of Key Logger?

Have existed for yearsHistory can’t be knownBelieved that first appeared by

government and won’t release any exact date

Believed that was used in the early 90’s

Type of Key Logger ?

• Type of Key Logger

There are two types Software-Based Key Logger

• Type of Key Logger (Continued)

Hardware-Based Key Logger

Process of Key Logger ?

• Process of Key Logger

Installed secretly on your computer

Capture information entered from

keyboard such as ID/Password or credit

card and save it in a file

Access file (via backdoor) and get

confidential data or collected information

may be transmitted

Protect your computer from Key Logger ?

• Protect your computer from Key Logger

Software-Based Key Logger

• Protect your computer from Key Logger

• Protect your computer from Key Logger

Hardware-Based Key Logger

• Why information security is very important?1

• Purpose and Process of Key Logger2

• Protect yourself from Key Logger3

• You Have Basic to Create Key Logger Software4

Summarize

Resources

• http://compnetworking.about.com/od/networksecurityprivacy/g/keylogger.htm

• http://www.parxy.com/history-keyloggers.html• http://en.wikipedia.org/wiki/Keystroke_logging• http://secudemy.com

QUESTIONS?

top related