Different types of keyloggers: Mitigation and risk relevancy in modern society
Blåfield, Toni (2020)
Blåfield, Toni
2020
Tieto- ja sähkötekniikan kandidaattiohjelma - Degree Programme in Computing and Electrical Engineering, BSc (Tech)
Informaatioteknologian ja viestinnän tiedekunta - Faculty of Information Technology and Communication Sciences
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Hyväksymispäivämäärä
2020-06-12
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tuni-202006096000
https://urn.fi/URN:NBN:fi:tuni-202006096000
Tiivistelmä
After computer networking through the Internet became popular, people decided to use mainly username-password combinations for their way to authenticate against different services. As a result, a significant tool was developed to attack this manner, a keylogger, to precisely collect this information and use it on behalf of the true owner.
There have not been too many researches and studies on this topic for a while, especially with same the research questions, therefore in this thesis the gap between the time from the previous researches up to date is researched. Some relatively new keylogger mitigation methods are introduced in this thesis.
The first purpose of this thesis is to give a detailed explanation of different types of keyloggers and their basic functionality, main targets, main use cases, and increase general awareness of the threat of a keylogger and the form of a keylogger in modern society.
After achieving a basic understanding of the previous aspects, the second purpose of this thesis is to introduce a few methods to mitigate these threats by their type, respectively. This thesis will also evaluate the relevancy of these threats in modern society. Finally, this thesis will conclude with a pervasive analysis of the relevance of these threats caused by keyloggers in the modern information security context.
In this thesis it is concluded that there are types of keyloggers that are not notably dangerous anymore, due to increased device mobility and smaller, handheld size of mobile devices. Consequently, physically visible keyloggers, like hardware keyloggers, are considered less as a threat. Despite that, there are new, modern, and remotely controlled mobile software keyloggers that can spread and collect keystroke input data without any level of visibility to the end user.
There have not been too many researches and studies on this topic for a while, especially with same the research questions, therefore in this thesis the gap between the time from the previous researches up to date is researched. Some relatively new keylogger mitigation methods are introduced in this thesis.
The first purpose of this thesis is to give a detailed explanation of different types of keyloggers and their basic functionality, main targets, main use cases, and increase general awareness of the threat of a keylogger and the form of a keylogger in modern society.
After achieving a basic understanding of the previous aspects, the second purpose of this thesis is to introduce a few methods to mitigate these threats by their type, respectively. This thesis will also evaluate the relevancy of these threats in modern society. Finally, this thesis will conclude with a pervasive analysis of the relevance of these threats caused by keyloggers in the modern information security context.
In this thesis it is concluded that there are types of keyloggers that are not notably dangerous anymore, due to increased device mobility and smaller, handheld size of mobile devices. Consequently, physically visible keyloggers, like hardware keyloggers, are considered less as a threat. Despite that, there are new, modern, and remotely controlled mobile software keyloggers that can spread and collect keystroke input data without any level of visibility to the end user.
Kokoelmat
- Kandidaatintutkielmat [8324]