From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Protecting against keylogging
From the course: Ethical Hacking: System Hacking
Protecting against keylogging
- [Instructor] Keylogging silently records all keystrokes and is generally used to gather sensitive information. In this segment, we'll outline how to defend your systems from keylogging. First, let's talk about how keyloggers operate and what they can do. Keyloggers can get into your system in several ways by email, file sharing, or downloading a game. They're difficult to detect because their very goal is to steal data without being discovered. And once in your system, they capture sensitive information such as passwords and credit card numbers. And because data theft is at stake, a keylogger could do more damage than a virus. So let's talk about some best practices to help protect against keylogging. Now, one area we can focus in on is system and network security. To start, make sure to use a firewall. Now, data from a keylogger is logged and then sent over the internet to a malicious actor. The amount of data can be small, so you might not see a huge increase in bandwidth…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.