In: Computer Science
For each project, provide a description of the technology, how it is used and for what purpose ( benefits), its functions/features, and details (screen shots and descriptions).
- Using a keylogger
-Scanning for Malware using the Microsoft
-Creating a Virtual Machine
-Examining Data Breaches- Visual
The intent is for someone to be able to review your
work and have a good understanding of what the technology does, its
functions/features, and see it actually in use.
Hello Dear
What you've asked in the question is not a 2 hour job certainly. Since i am time bound so i'm giving you a brief explanation of how these things work.Hope it helps to you.
Like please if you found it helpful.
Keylogger :-
a piece of software that records the signals sent from a keyboard to a computer usually for the purpose of gaining information about the user without the user's knowledge.The keyboard is the primary aim for key loggers to retrieve user input from because it is the most common user interface with a computer. Although both hardware and software key loggers exist but software key loggers are the dominant form. Software keylogger are most inexpensive easily used program. This keyloggers need to be adapted to each target operating system to ensure I/O is handled appropriately.
Additional detail about techniques used in the development, distribution, execution and detection of user- and kernel-mode keyloggers, particularly on Microsoft Windows operating system. A basic concept behind keyloggers and similar malware is their pattern of attack. Most of malware infections follow a fairly standard attack pattern that involves the sequential order of development, distribution and infection, and execution stages. Distribution and execution can both be implemented as a component of the malware and therefore are a contributing factor in its design and development. The keylogging malware to begin executing and can occur in several different ways depending on the implementation and context of the keylogger. However, most realistic keyloggers share two operations:
(a) hooking into user input flow to receive keystrokes
(b) transporting the data to a remote location.
Keylogger applications designed by implementing the Exact String Matching algorithm can record all user activities related to the keyboard, and the results are stored automatically in a dedicated database that can only be accessed by the keylogger owner, the next development of the keylogger application can record the activity on the virtual keyboard or remote activity on the user's computer.
Control of employees and protection against information leaks. Keylogger can be used to monitor correspondence of employees on company computers and control of working time.Control of children and loved ones. Keylogger allows conducting hidden control of computer use by your children. You will protect your children from inappropriate content from the Internet.
Scanning for malware using Microsoft:-
Malware is a short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. they are mainly of 5 types:-
1) Worms 2)Ransomware 3)Scareware 4)Fileless malware 5)Adware and spyware.
Scanning for malware means looking for these bugs inside the computer.
With spam and phishing email being the primary vector by which malware infects computers, the best way to prevent malware is make sure your email systems are locked down tight—and users know how to spot danger.
Although various tools are available in the market to get rid of these malware.Also inbuilt security softwares and programmes has been feed into the system.Windows virus scanning and firewall protection are amongst them. Most of the minor problems can be handled by these inbuilt scanners but they are not always helpful. Infact in some cases antivirus tools also can't help you further.
Creating a virtual Machine:-
In the simplest words Virtual machine is nothing but a computer within a computer.The first question should come in our mind is why do we need virtual machine?
Developers! We see out there. Writing, testing, and deploying projects without fear of ruining the beautiful MacBook. But again, you’re not held back by your device. Need to develop for Android, Windows, or Linux? No problem. Use a virtual machine to achieve your goals safely. That's where virtual machine come into picture.
IT Managers have saved hundreds of thousands of dollars by using virtual machines. This allows for all employees to have exactly what they need without breaking that IT budget by buying multiple computers for multiple people.
There are several good free virtual machine apps out there, which makes setting up a virtual machine something anybody can do. You’ll need to install a Virtual machine software, and have access to installation media for the operating system you want to install.In a particular Virtual machine, the guest OS is stored on a virtual hard drive—a big, multi-gigabyte file stored on your real hard drive. The Virtual machine software presents this file the guest OS as a real hard drive. This means you won’t have to mess around with partitioning or doing anything else complicated with your real hard drive.
The limit to how many Virtual machines you can have are really just limited by the amount of hard drive space.You can also run multiple Virtual machines at the same time, but you’ll find yourself somewhat limited by your system resources. Each Virtual machine eats up some CPU time, RAM, and other resources.
Examining Data Breaches:-
Data breaches are events where information is taken from a system without the system owner's knowledge, and usually without the account holder being aware of it, either. This can be done physically by accessing a computer or network to steal local files or by bypassing network security remotely. The latter is often the method used to target companies.
The type of information taken is largely dependent on the target of the data breach, but in the past, the information has included personal health information; personal identification information, such as name, password, address, and social security number; and financial information, including banking and credit card information.After a series of high-profile data breaches – like Cambridge Analytica and Facebook, or Under Armour and the MyFitnessPal application – business owners turn their gaze back to cybersecurity.
End users are almost never the target of cybercriminals who are out to steal sensitive information in bulk, unless an individual is connected to an industry. However, end users can be affected when their records were part of the information stolen from big companies.To effectively prevent data breaches, companies in the financial industry need to invest in the infrastructure and expertise to protect themselves. And if financial executives truly want to safeguard their organizations, they’ll also need to educate themselves about the constantly-evolving threats their company faces.Once executives understand more about cybersecurity, they’ll want to work to identify potential gaps in their security strategies, and find workable solutions to fill them. These include educating employees about data breaches, instituting new employee policies for increased data safety and taking on the task of updating software and hardware systems, if necessary.