...EXECUTIVE SUMMARY The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords. Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including: Parental control, Company security, law enforcement,Jealous spouses or partners can use a keylogger and many more reasons. But today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose.Furthermore, many keyloggers hide themselves in the system (i.e. they have rootkit functionality), which makes them fully-fledged Trojan programs. Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children's whereabouts on the Internet, most privacy advocates agree that the potential for abuse...
Words: 1408 - Pages: 6
...Keylogger A keylogger, also known as keystroke logging or keylogging, is a method of tracking the strokes on a keyboard without the knowledge of the user. This information is then collected and used to access private accounts or collect personal information. Types of keyloggers Keyloggers can be one of three types: Hardware Keyloggers: small inline devices placed between the keyboard and the computer. Because of their size they can often go undetected for a long time, but they do require physical access to the machine. These hardware devices have the power to capture hundreds of keystrokes including banking and email username and passwords. Software using a hooking mechanism: a type of logging that uses the Windows function SetWindowsHookEx() that monitors all keystrokes and can even capture autocomplete passwords. The spyware will typically come packaged as an executable file that initiates the hook function, plus a DLL file to handle the logging functions. Kernel/driver keyloggers: a this type of keylogger that is at the kernel level and receives data directly from the input device (typically, a keyboard). It replaces the core software for interpreting keystrokes. It can be programmed to be undetectable by taking advantage of the fact that it is executed on boot, before any user-level applications start. However, since it runs at the kernel level, it cannot record autocomplete passwords, as this information is passed in the application layer. How keyloggers...
Words: 623 - Pages: 3
...Unit 5 Michael Bolton IT590 Legal and Ethical Issues in IT January 17, 2014 Dr. Ellen Raineri Kaplan University Part 1 ACM Code of Ethics A council from the Association of Computing Machinery (ACM) revised their Code of Ethics in 1992. This Code contains 24 commitments for members to follow personally (Anderson, Johnson, Gotterbarn, & Perrolle, 1993). The ACM Code of Ethics is broken down into four sections with the imperatives listed below them. Section 1 pertains to general moral guidelines, section 2 pertains to guidelines that are more specific, section 3 is organizational leadership imperatives, and section 4 is compliance (Anderson, Johnson, Gotterbarn, & Perrolle, 1993). The moral guidelines section contains contributing to the well-being of humans and society, avoiding harm to people, honesty, fairness, honor property rights and copyrights, and giving credit for intellectual property. The moral guidelines section contains contributing to the well-being of humans and society, avoiding harm to people, honesty, fairness, honor property rights and copyrights, giving credit for intellectual property, respecting others privacy, and honoring confidentiality (Anderson, Johnson, Gotterbarn, & Perrolle, 1993). Section 2 demands that ACM members strive for high quality work, remain competent in their work, know and abide by laws, seek review from professionals, give thorough analysis of systems, honor commitments, aid the public with understanding...
Words: 1288 - Pages: 6
...Employers often want to find out if their workers are productive and loyal. Determine at least one limit that you would place upon a private employer’s rights to monitor the productivity and communications of employees at work. Support your response. Businesses contend that monitoring to increase employee productivity, efficiency, and work quality is necessary in order to compete in the global marketplace. This is also necessary to ensure workers are productive and loyal to the company. Employers are concerned with proper employee behavior and Code of Conduct compliance in relation to their industries and related organizations. More employers are using monitoring devices to check or keep track of their employees' actions, behavior, and theft. Employers have a legitimate interest in keeping track of how their employees spend their work hours, whether doing business or goofing off or extortion. Therefore, employers use several types of employee monitoring systems such as computer monitoring, video surveillance, investigators, undercover operatives, spying, eavesdropping, electronic mail and voice mail, and active badge systems to help monitor their employees. Employers are allowed to monitor their employees' communications, within reasonable limits, but employers must make sure that their monitoring does not violate their workers' privacy rights. On a practical level, employers must decide how much monitoring is necessary to serve their legitimate interests without...
Words: 773 - Pages: 4
...identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to access a workstation with a retry limit. This is to help thwart any hacking attempts that could be made such as: Man in the middle attacks, keylogging and brute forcing. Also using knowledge authentication for recovery will make it harder to any potential threats to take ownership of an account. The last part I need to cover is Authorization, which is what you are: this means biometric security...
Words: 364 - Pages: 2
...identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to access a workstation with a retry limit. This is to help thwart any hacking attempts that could be made such as: Man in the middle attacks, keylogging and brute forcing. Also using knowledge authentication for recovery will make it harder to any potential threats to take ownership of an account. The last part I need to cover is Authorization, which is what you are: this means biometric security...
Words: 364 - Pages: 2
...Question: Since HIPAA requires Multi-Factor Authentication for users to access our networks remotely, what’s the difference between single channel Multi-Factor and dual channel Multi- Factor Authentication? Additionally, is there a cost difference between both? Answer: The use of multi-factor authentication to prove one’s identity is based on the premise that an unauthorized actor is unlikely to be able to supply the factors required for access. If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, the user’s identity is not established with sufficient certainty and access to the asset (network, website or data) being protected by multifactor authentication then remains blocked. The authentication...
Words: 839 - Pages: 4
...threat is a threat with attributes of both boot sector and file viruses. These types of threats can spread from the MBR or boot sector to infect executable programs, or spread from a single file to infect the boot sector. A macro is a type of formula language used in complex tasks in software such as Microsoft word or excel. These threats are capable of assigning multiple key commands to one action . Macros infect systems through a document file type and infect he host once the file is accessed. A Trojan Horse threat is a threat that presents itself as a legitimate piece of software. After it has been installed the software can then perform a variety of actions such as sending sensitive information back to a remote computer via a keylogging to executing commands to erase or format the host computers hard drive. An email worm is a malicious threat coded as an executable file that can replicate itself in order to spread to other computers. Unlike...
Words: 644 - Pages: 3
...pre scan * Prevents new viruses that aren’t in the database * Real time file scanning * Enables creation of a bootable disk or USB to disinfect a pc / restore it to health ( if malware infiltrates) * Laptop mode to prevent drainage of battery | | | | | Bit DefenderAntivirus Plus 2015 | * Bitdefender One Click Security * USB Immunizer * One Click Security * Zero Performance Impact * Complete Data Protection * Ransomware Protection * Fast and Secure Payments * Quick Vulnerability Scanner * Game, Movie, Work Modes that adjust the program to accompany your experience | | | | | KasperskyAnti-Virus 2015 | * Ability to detect, prevent and remove viruses * Includes a virtual keyboard to prevent keylogging * Dangerous Website Alerts * Secure Online Transactions * Rapid reaction to new and emerging threats * Optimized Pc Performance | | | | | What I recommend in an Anti- Virus is full protection and performance. I’m not impatient but in today’s rising tide we need something that is fast and efficient that could catch the tiniest mishap. Something that allows me to do my day to day activities without missing a beat. A program that could catch a brand new virus is quite savvy also something that would have me covered if I went headfirst into a virus pit. Backups/ Data restore is your best friend when it come to a severe virus infection so that’s definitely something I would want. And finally but not all, a program that becomes...
Words: 254 - Pages: 2
...user. Users should be identified by rank with higher ranking users requiring more authentication. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to access a workstation with a retry limit. This is to help thwart any hacking attempts that could be made such as: Man in the middle attacks, keylogging and brute forcing. Also using knowledge authentication for recovery will make it harder to any potential threats to take ownership of an account. The last part...
Words: 477 - Pages: 2
...Keylogger Scam 2 The word "Key Logger" is also called "KeyLogging". The Keystroke logging is used to track user's key stroke during software development. The typical use of this tool is to increase efficiency of employee in data entry or word processing related work. The tool is also used in software development and for monitoring activities on computers under surveillance or used by government agencies monitoring criminals or parties interested in decoding passwords for computer networks. In order to be able to tell if you have key logger spyware on your computer, you need to know what it is and understand how it works. This spyware is an invisible software program that is used by identity thieves to track your activity online. Unfortunately, it is nearly impossible to know if you have this software on your computer and it does not matter how careful you are, you will never be able to tell if your information personal information is being recorded. This is scary since those who use key logger spyware are usually after your bank account passwords and credit card numbers. The recording of key strokes on keyboard can be done either by software or hardware. The hardware attachment comes portable which can be attached to keyboard for recording. There are some keyboards, which has it already built-in. On software side key logging can be written as software program and then downloaded on computer or computer network, this program secretly records user's...
Words: 560 - Pages: 3
...Aircraft Solutions, headquartered in San Diego, California, is a company specializing in business-to-business products and services. Their customers are primarily in the electronic, commercial, defense and aerospace industries. They specialize in offering low-cost design and computer-aided packages to help their customers lower their costs for development and involve their customers in every step of the fabrication process while utilizing the Business Process Management System (BPM). With this method they hope to keep repeat business and attain long-lasting customer relationships. They have two remote locations outside of San Diego: The commercial division is 40 miles east in Chula Vista, California and the defense division is 90 miles away in Santa Ana, California. Aircraft Solutions prides itself on being recognized as an industry leader. However, after assessing the company’s information security, they may not be a leader for much longer. Two major security weaknesses have been identified: a hardware configuration problem and an unsound security policy for the firewalls. The company has five servers, a database, one switch, two routers, and a firewall. All of the hardware is behind the firewall except the main router. This router connects directly to the Internet, which is also the connection the commercial division in Chula Vista uses to connect to the headquarters. This configuration is set up in such a way where all Internet traffic hits the main router first...
Words: 1260 - Pages: 6
...Name: ____________________________ 1. List (do not explain) the three sides of the traditional C.I.A triangle in information security. Confidentiality, Integrity, Availability 2. Explain what is meant by Confidentiality in the context of security. Limiting information access and disclosure to authorized users. 3. Explain what is meant by the term Integrity in the context of security. The trustworthiness of information sources. 4. Explain what is meant by Authenticity in the context of security Both parties validating their identities. 5. List the components of an Information System Software, Hardware, Data, Networks, People. 6. Explain the basic conflict between Access to Information and Securing Information, and why it is not necessarily a good idea to have the same person be the Network Administrator and also the Security Administrator. The security system must provide reasonable access, but also protect against threats. This sometimes leads to the needs of users being looked over in favor of greater protection. It is better to have separate admins due to the fact that each admin can focus solely on his appointed task and be better schooled in their particular field. 7. Explain why it is critical that programmers consider security when writing programs. Because software bugs are potential security risks, creating backdoors that can bypass security that is in place. 8. Explain the differences between Computer Security...
Words: 746 - Pages: 3
...space, it has the ability to make expert decisions without a lot of human intervention. It is available for free for android mobile phones, and free for one month trial and costs $75.95 for the full version. Kaspersky Anti-Virus has three attributes, protection against infections, performance in terms of the product’s influence on computer speed, and usability which measures the accuracy with which a virus scanner labels threat. It provides not only protection from malware but also spyware, rootkits, security exploits and screen lockers. Kaspersky includes a virtual keyboard that prevents another form of malware called a keylogger. It lets you enter information into an on screen keyboard, which bypasses the physical keyboard and prevents keylogging. It warns you about the safety of sites that show up when you conduct an online search and blocks access to it. It has a free one month trial for android phones and costs $14.95 for the full version. For the PC it costs $59.95 for the full version. McAfee allows control over which files to scan including email attachments, network drives and instant message attachments. It can boost the performance of computers by erasing files that are not needed and the shredder can erase files beyond recovery even with the use of recovery software. It has a firewall which enables you to block internet access and has a locator for lost mobile devices. There is a secure cloud storage feature where you can securely store sensitive documents online and...
Words: 1861 - Pages: 8
...Certified Ethical Hacker Unit 2 Project Presented By Sandra Grannum To Dr. Pace On December 13, 2011 Table of Contents Abstact………………………………………………………………………………………………………..3 Seven steps of Information gathering…………………………………………………..………..4 Popular Reconnaissance tools……………………………………………………………………….5 Methods to crack passwords on windows linux and Mac…………………………….…..8 Password Cracker downloads…………………………………………………………….………….9 Security Plan……………………………………………………………………………………………….. 9-11 Steps to remove evidence……………………………………………………………………………. 11 References:…………………………………………………………………………………………………..12 Abstract This paper list and describe the seven steps of information gathering and describe some of the most popular reconnaissance tools while explaining the benefits and limitations of each. Included as well is the method to crack passwords on Windows, Linux, and Mac. There is also a password cracker tool that was downloaded on my home computer that describes the steps and outcomes. Least but not last, a security plan is also included in this project and the steps to remove evidence of an attack on a network. Define the seven-step information gathering process • Information gathering is divided into seven steps. These steps include gathering information, determining the network range, identifying active machines, finding open ports and access points, OS fingerprinting, fingerprinting services, and mapping the network. Define footprinting ...
Words: 2645 - Pages: 11