Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed...
-
Upload
lilian-miranda-smith -
Category
Documents
-
view
215 -
download
1
Transcript of Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed...
![Page 1: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/1.jpg)
Keyloggers At WorkJason Clark
![Page 2: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/2.jpg)
2
History• Believed to have been first used by the
government• Believed that they were used in the early
1990’s• Software key loggers came before
hardware key logging devices
![Page 3: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/3.jpg)
3
Types of key loggers
2 types of key loggers
• Software
• Hardware
![Page 4: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/4.jpg)
4
Software• do not require physical access to the
user’s computer.• can be manually downloaded or secretly
downloaded as spyware• will upload the logged data to a remote
drive or email
![Page 5: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/5.jpg)
5
Hardware• connects between the user’s keyboard and
monitor• easy to hide • data is stored on a mini hard drive located
within the device
![Page 6: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/6.jpg)
6
Why are they being used?• Web browsing• Social networking, such as FaceBook, Twitter• On-line entertainment, such as gaming, YouTube, blogs• Private E-mail correspondence• Instant messaging• Skype• File sharing over P2P networks
Cyberslackers!
![Page 7: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/7.jpg)
7
The problem…
There is potential for invasion of privacy!• Gain access to any personal emails• See web searches • See instant messages
![Page 8: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/8.jpg)
8
Is it legal?
Short answer, yes..
There is currently no federal law that has been interpreted to prohibit their surreptitious use.
![Page 9: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/9.jpg)
9
Electronic Communications Privacy Act
The ECPA could potentially prevent keystroke theft, but thus far the protections it offers have not been extended to keyloggers.
![Page 10: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/10.jpg)
10
For example…
Rene v. G.F. Fishers, Inc
![Page 11: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/11.jpg)
11
So is it ethical? …not really!Employers claim…
“computer surveillance and key logging is important to ensure productivity” Website blockersRemote desktop accessTime audits
![Page 12: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/12.jpg)
12
Conclusion
Although using key loggers at a place of employment works and is legal, there are more ethical ways to ensure productivity without the risk of invading someone’s privacy.
![Page 13: Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.](https://reader036.fdocuments.in/reader036/viewer/2022062516/56649e705503460f94b6d8e3/html5/thumbnails/13.jpg)
13
Resources• http://www.securelist.com/en/analysis?pubid=204791931• http://searchmidmarketsecurity.techtarget.com/definition/keylogger• http://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss
ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Personal+Information.html
• http://usatoday30.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm
• http://www.parxy.com/history-keyloggers.html• http://
jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act-regulation-of-keyloggers-in-the-workplace
• http://www.ehow.com/list_7252161_problems-keyloggers.html• http://news.cnet.com/8301-13578_3-10099123-38.html