IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Key Logger and Prevention of Security Breaches

Key Logger and Prevention of Security Breaches
View Sample PDF
Author(s): Aparna Datta (Meghnad Saha Institute of Technology, India), Akash Mondal (Meghnad Saha Institute of Technology, India)and Arunima Sarkar (Meghnad Saha Institute of Technology, India)
Copyright: 2025
Pages: 16
Source title: Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices
Source Author(s)/Editor(s): Rajeev Kumar (Moradabad Institute of Technology, India), Saurabh Srivastava (Moradabad Institute of Technology, India)and Ahmed A. Elngar (Beni-Suef University, Egypt)
DOI: 10.4018/979-8-3693-9235-5.ch006

Purchase

View Key Logger and Prevention of Security Breaches on the publisher's website for pricing and purchasing information.

Abstract

Keyloggers are malicious programs that record keystrokes and jeopardize the security of personal and business data. These sneaky malwares grab vital information while evading user discovery. Keyloggers conceal their existence by using techniques like rootkits to bypass antivirus and other security measures. Once installed, they are not visible on the process monitor . Attackers may unlawfully access sensitive information, such as banking credentials. One major worry regarding keyloggers is that around 90% of them now function in the user's environment without express authorization, leaving the user unaware that their device is being watched. Although there are hazards, addressing the keylogger threat necessitates preventative actions. This article proposes ways to improve the prevention of assaults, such as hacking. It advocates employing strong security tools and increasing cybersecurity awareness. Additionally, the following discussion suggests methods to understand the capabilities of keyloggers, develop detection methods, and rigorously evaluate countermeasures accordingly.

Related Content

Harish Chandra Verma, Saurabh Srivastava. © 2025. 12 pages.
Lingala Thirupathi, B. Vasundara, Dheeraj Sundaragiri, Vijaya Bhaskar Ch, Ravi Gugulothu, Radhika Pulyala. © 2025. 26 pages.
Mohd Saleem, Rajeev Kumar, Chanchal Chawla, Mahendra Singh. © 2025. 14 pages.
Nobhonil Roy Choudhury, Shyamalendu Paul. © 2025. 22 pages.
Abhay Bhatia, Anil Kumar, Devendra Sood. © 2025. 32 pages.
Aparna Datta, Akash Mondal, Arunima Sarkar. © 2025. 16 pages.
Adrija Das, Pratyasha Nanda, Ritika Jain, Tanisha Saini, Sneha Bhaskar, Hitesh Mohapatra. © 2025. 18 pages.
Body Bottom