Abstract:
Key logger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, often for malicious purposes. Key loggers thus pose a major threat to business and personal activities such as Internet transactions, online banking, email, or chat. To deal with such threats, not only must users be made aware about this type of malware, but software practitioners and students must also be educated in the design , implementation, and monitoring of effective defenses against different key logger attacks.
This paper presents a case for incorporating key logging in cyber security education. First, the paper provides an overview of keylogger programs, discusses keylogger
design, implementation, and usage, and presents effective approaches to detect and prevent key logging attacks. Second, the paper outlines several keylogging projects that can be incorporated into an undergraduate computing program to educate the next generation of cyber security practitioners in this important topic.
Post a Comment