+ All Categories
Home > Documents > Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed...

Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed...

Date post: 29-Dec-2015
Category:
Upload: lilian-miranda-smith
View: 216 times
Download: 1 times
Share this document with a friend
Popular Tags:
13
Keyloggers At Work Jason Clark
Transcript
Page 1: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

Keyloggers At WorkJason Clark

Page 2: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

2

History• Believed to have been first used by the

government• Believed that they were used in the early

1990’s• Software key loggers came before

hardware key logging devices

Page 3: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

3

Types of key loggers

2 types of key loggers

• Software

• Hardware

Page 4: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

4

Software• do not require physical access to the

user’s computer.• can be manually downloaded or secretly

downloaded as spyware• will upload the logged data to a remote

drive or email

Page 5: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

5

Hardware• connects between the user’s keyboard and

monitor• easy to hide • data is stored on a mini hard drive located

within the device

Page 6: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

6

Why are they being used?• Web browsing• Social networking, such as FaceBook, Twitter• On-line entertainment, such as gaming, YouTube, blogs• Private E-mail correspondence• Instant messaging• Skype• File sharing over P2P networks

Cyberslackers!

Page 7: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

7

The problem…

There is potential for invasion of privacy!• Gain access to any personal emails• See web searches • See instant messages

Page 8: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

8

Is it legal?

Short answer, yes..

There is currently no federal law that has been interpreted to prohibit their surreptitious use.

Page 9: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

9

Electronic Communications Privacy Act

The ECPA could potentially prevent keystroke theft, but thus far the protections it offers have not been extended to keyloggers.

Page 10: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

10

For example…

Rene v. G.F. Fishers, Inc

Page 11: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

11

So is it ethical? …not really!Employers claim…

“computer surveillance and key logging is important to ensure productivity” Website blockersRemote desktop accessTime audits

Page 12: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

12

Conclusion

Although using key loggers at a place of employment works and is legal, there are more ethical ways to ensure productivity without the risk of invading someone’s privacy.

Page 13: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

13

Resources• http://www.securelist.com/en/analysis?pubid=204791931• http://searchmidmarketsecurity.techtarget.com/definition/keylogger• http://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss

ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Personal+Information.html

• http://usatoday30.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm

• http://www.parxy.com/history-keyloggers.html• http://

jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act-regulation-of-keyloggers-in-the-workplace

• http://www.ehow.com/list_7252161_problems-keyloggers.html• http://news.cnet.com/8301-13578_3-10099123-38.html


Recommended