Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 1

Bajaj Institute of Technology, Wardha

Key Logger in Cyber Security


Asad Shahakar Baig
Introduction Block diagram Conclusion
• Key loggers are a type of • A key logger is a type of
monitoring software designed surveillance software or
to record keystrokes made by a hardware device that has
user. One of the oldest forms capability to record every
of cyber threat, these keystroke.
keystroke loggers record the • There are two types of key
information you type into a logger namely hardware key
website or application and logger and software key
send to back to a third party. loggers.
Objectives References
• The main objective of key • Shetty, S. (2005, April).
loggers is to interfere in the Introduction to spyware key
chain of events that happen loggers. Security Focus.
when a key is pressed and Retrieved 27 March 2008
when the data is displayed on from
the monitor as a result of a http://www.securityfocus.co
keystroke. m/infocus/1829

• Either it can be hardware key • https://


logger or software key logger. www.researchgate.net/
publication/
www.bingimages.com 228797653_Keystroke_loggi
Department of Computer Engineering ng_keylogging
3rd semester/roll no.207.

You might also like