1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Keylogging
A method of capturing and recording user keystrokes, providing a means to obtain passwords or encryption keys.
Benefits of Keylogging
-parents can monitor kids
-employers can monitor employees
-passwords can be saved
-can be used for research
Negatives of Keylogging
steal sensitive information from the victims, such as credit card numbers, passwords, personal emails, banking credentials, driver's license numbers, and so forth.
Hardware Key logging
small chip/wire that is attached to computer; can be easily removed (when removed, the keylogging stops), preferred key logging for employers, wireless ones can exist
Software Keylogging
-harder to detect
-usually secret
-can record screens
Prevent Hardware Keylogging
-Check USB area of laptop in public areas
-use deceptive typing, so that even when you are typing in your password, if anyone is tracking it, they wont get your information
Prevent Software Keylogging
install antivirus, be cautious for phishing attacks, be careful of online money transactions, keep software updated
Get rid of Software Keylogging
Install an anti-keylogger program or format and reinstall your operating system completely.
Phishing
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Spear Phishing
Attack is targetted at you, typically more difficult to spot
Effects of Spear Phishing
financial drain, cyber attack, lost info
Signs of Spear Phishing
Urgency, Authority, mimicry (of types of emails you usually get), curiosity,
Steps to prevent/deal with phishing
1) Think before you click, verify credibility, check with colleague, do not panic