keyloggers at work

Post on 25-Feb-2016

43 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Keyloggers At Work. Jason Clark. History. Believed to have been first used by the government Believed that they were used in the early 1990’s Software key loggers came before hardware key logging devices. Types of key loggers. 2 types of key loggers Software Hardware. Software. - PowerPoint PPT Presentation

TRANSCRIPT

Keyloggers At WorkJason Clark

2

History• Believed to have been first used by the

government• Believed that they were used in the early

1990’s• Software key loggers came before

hardware key logging devices

3

Types of key loggers2 types of key loggers

• Software

• Hardware

4

Software• do not require physical access to the

user’s computer.• can be manually downloaded or secretly

downloaded as spyware• will upload the logged data to a remote

drive or email

5

Hardware• connects between the user’s keyboard and

monitor• easy to hide • data is stored on a mini hard drive located

within the device

6

Why are they being used?• Web browsing• Social networking, such as FaceBook, Twitter• On-line entertainment, such as gaming, YouTube, blogs• Private E-mail correspondence• Instant messaging• Skype• File sharing over P2P networksCy

berslackers!

7

The problem…There is potential for invasion of privacy!• Gain access to any personal emails• See web searches • See instant messages

8

Is it legal?Short answer, yes..

There is currently no federal law that has been interpreted to prohibit their surreptitious use.

9

Electronic Communications Privacy ActThe ECPA could potentially prevent keystroke theft, but thus far the protections it offers have not been extended to keyloggers.

10

For example…Rene v. G.F. Fishers, Inc

11

So is it ethical? …not really!Employers claim…

“computer surveillance and key logging is important to ensure productivity” Website blockersRemote desktop accessTime audits

12

ConclusionAlthough using key loggers at a place of employment works and is legal, there are more ethical ways to ensure productivity without the risk of invading someone’s privacy.

13

Resources• http://www.securelist.com/en/analysis?pubid=204791931• http://searchmidmarketsecurity.techtarget.com/definition/keylogger• http://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss

ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Personal+Information.html

• http://usatoday30.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm

• http://www.parxy.com/history-keyloggers.html• http://

jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act-regulation-of-keyloggers-in-the-workplace

• http://www.ehow.com/list_7252161_problems-keyloggers.html• http://news.cnet.com/8301-13578_3-10099123-38.html

top related