Welcome To
Presentation on
Keyloggers
Presented To:
Fairuz Shaiara
Lecturer
Department of Computer Science and Engineering
Computer Science and Engineering, Green University of
2
Computer Science and Engineering, Green University of
Mohammad Sajjad Hossain
203015006
Md Ashraful Islam
203015004
Ikhtiar Uddin
203015008
Team Members
Table of Contents
❏ Introduction to Keyloggers
❏ Types of Keyloggers
❏ How Keyloggers Work
❏ Common Uses of Keyloggers
❏ Detection of Keyloggers
❏ Prevention and Protection
❏ Future Trends and Challenges
❏ Conclusion
3
Computer Science and Engineering, Green University of
Introduction
4
Defining Keyloggers as tools or software that record keystrokes made on a
keyboard, capturing sensitive information such as passwords and credit card
numbers
Computer Science and Engineering, Green University of
Types of Keyloggers
5
Computer Science and Engineering, Green University of
❏ Keystroke Logging
❏ Clipboard Logging
❏ Screen Capture
❏ Network Traffic Monitoring
❏ Transmission of Data: FTP Upload, Remote Server Communication:
How Keyloggers Works
6
Computer Science and Engineering, Green University of
● Legitimate Uses
❏ Employee Monitoring
❏ Parental Control
● Malicious Uses
❏ Identity Theft
❏ Corporate Espionage
❏ Unauthorized Surveillance
Common Uses of Keyloggers
7
Computer Science and Engineering, Green University of
❏ Antivirus and Anti-malware Software
❏ Behavioral Analysis
❏ Manual Inspection
❏ Security Tools
Detection of Keyloggers
8
Computer Science and Engineering, Green University of
❏ Use Anti-malware Software
❏ Enable Firewall
❏ Update Software Regularly
❏ Be Cautious with Downloads
❏ Use Two-factor Authentication
Prevention and Protection
9
Computer Science and Engineering, Green University of
Future Trends
➢ Advanced Evasion
➢ AI Integration
➢ Keylogger-as-a-Service
Challenges
➢ Improved Detection
➢ Stronger Security
➢ Legal Measures
➢ User Awareness
Future Trends and Challenges
10
Computer Science and Engineering, Green University of
➢ As there are always two sides to a coin just like this keylogger has a good as well as bad
reputation
➢ In the world of hacking it is used to hack someone's details. On the other hand, it is
used in a company to monitor any suspicious activity that may cause serious liability
to the company’s benefit.
➢ But we must be aware of what is installed on the computer. Use when surfing the
internet.
Conclusion
11
12
THANK YOU
Does anyone have any
questions?
Computer Science and Engineering, Green University of

Presentation on Keyloggers in Cyber Security

  • 1.
    Welcome To Presentation on Keyloggers PresentedTo: Fairuz Shaiara Lecturer Department of Computer Science and Engineering Computer Science and Engineering, Green University of
  • 2.
    2 Computer Science andEngineering, Green University of Mohammad Sajjad Hossain 203015006 Md Ashraful Islam 203015004 Ikhtiar Uddin 203015008 Team Members
  • 3.
    Table of Contents ❏Introduction to Keyloggers ❏ Types of Keyloggers ❏ How Keyloggers Work ❏ Common Uses of Keyloggers ❏ Detection of Keyloggers ❏ Prevention and Protection ❏ Future Trends and Challenges ❏ Conclusion 3 Computer Science and Engineering, Green University of
  • 4.
    Introduction 4 Defining Keyloggers astools or software that record keystrokes made on a keyboard, capturing sensitive information such as passwords and credit card numbers Computer Science and Engineering, Green University of
  • 5.
    Types of Keyloggers 5 ComputerScience and Engineering, Green University of
  • 6.
    ❏ Keystroke Logging ❏Clipboard Logging ❏ Screen Capture ❏ Network Traffic Monitoring ❏ Transmission of Data: FTP Upload, Remote Server Communication: How Keyloggers Works 6 Computer Science and Engineering, Green University of
  • 7.
    ● Legitimate Uses ❏Employee Monitoring ❏ Parental Control ● Malicious Uses ❏ Identity Theft ❏ Corporate Espionage ❏ Unauthorized Surveillance Common Uses of Keyloggers 7 Computer Science and Engineering, Green University of
  • 8.
    ❏ Antivirus andAnti-malware Software ❏ Behavioral Analysis ❏ Manual Inspection ❏ Security Tools Detection of Keyloggers 8 Computer Science and Engineering, Green University of
  • 9.
    ❏ Use Anti-malwareSoftware ❏ Enable Firewall ❏ Update Software Regularly ❏ Be Cautious with Downloads ❏ Use Two-factor Authentication Prevention and Protection 9 Computer Science and Engineering, Green University of
  • 10.
    Future Trends ➢ AdvancedEvasion ➢ AI Integration ➢ Keylogger-as-a-Service Challenges ➢ Improved Detection ➢ Stronger Security ➢ Legal Measures ➢ User Awareness Future Trends and Challenges 10 Computer Science and Engineering, Green University of
  • 11.
    ➢ As thereare always two sides to a coin just like this keylogger has a good as well as bad reputation ➢ In the world of hacking it is used to hack someone's details. On the other hand, it is used in a company to monitor any suspicious activity that may cause serious liability to the company’s benefit. ➢ But we must be aware of what is installed on the computer. Use when surfing the internet. Conclusion 11
  • 12.
    12 THANK YOU Does anyonehave any questions? Computer Science and Engineering, Green University of