Download - Keyloggers At Work

Transcript
Page 1: Keyloggers  At Work

Keyloggers At WorkJason Clark

Page 2: Keyloggers  At Work

2

History• Believed to have been first used by the

government• Believed that they were used in the early

1990’s• Software key loggers came before

hardware key logging devices

Page 3: Keyloggers  At Work

3

Types of key loggers2 types of key loggers

• Software

• Hardware

Page 4: Keyloggers  At Work

4

Software• do not require physical access to the

user’s computer.• can be manually downloaded or secretly

downloaded as spyware• will upload the logged data to a remote

drive or email

Page 5: Keyloggers  At Work

5

Hardware• connects between the user’s keyboard and

monitor• easy to hide • data is stored on a mini hard drive located

within the device

Page 6: Keyloggers  At Work

6

Why are they being used?• Web browsing• Social networking, such as FaceBook, Twitter• On-line entertainment, such as gaming, YouTube, blogs• Private E-mail correspondence• Instant messaging• Skype• File sharing over P2P networksCy

berslackers!

Page 7: Keyloggers  At Work

7

The problem…There is potential for invasion of privacy!• Gain access to any personal emails• See web searches • See instant messages

Page 8: Keyloggers  At Work

8

Is it legal?Short answer, yes..

There is currently no federal law that has been interpreted to prohibit their surreptitious use.

Page 9: Keyloggers  At Work

9

Electronic Communications Privacy ActThe ECPA could potentially prevent keystroke theft, but thus far the protections it offers have not been extended to keyloggers.

Page 10: Keyloggers  At Work

10

For example…Rene v. G.F. Fishers, Inc

Page 11: Keyloggers  At Work

11

So is it ethical? …not really!Employers claim…

“computer surveillance and key logging is important to ensure productivity” Website blockersRemote desktop accessTime audits

Page 12: Keyloggers  At Work

12

ConclusionAlthough using key loggers at a place of employment works and is legal, there are more ethical ways to ensure productivity without the risk of invading someone’s privacy.

Page 13: Keyloggers  At Work

13

Resources• http://www.securelist.com/en/analysis?pubid=204791931• http://searchmidmarketsecurity.techtarget.com/definition/keylogger• http://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss

ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Personal+Information.html

• http://usatoday30.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm

• http://www.parxy.com/history-keyloggers.html• http://

jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act-regulation-of-keyloggers-in-the-workplace

• http://www.ehow.com/list_7252161_problems-keyloggers.html• http://news.cnet.com/8301-13578_3-10099123-38.html


Top Related