Creating a software keylogger for cyber
security
Giral Faurel ONDZONGO
[email protected]
Department of Computer Science and Engineering , School of Engineering and Technology , Sharda
University, Greater Noida , India
Abstract:
Keylogger is a software that records each and every keystroke the victim enter, including mouse
clicks. In our day, it’s very hard to trust human, they lied, joke, play and most of the time try to
get only their own profit, but humans trust machine (Software) because they created them and
made some rules for machines that machine cannot break because they are under human control
by programing and algorithm. Cyber security is the police of the internet and keylogger is one of
his weapon. Keylogger can be used to spy the victim and most of the time it gives as output the
most accurate report possible that even human cannot product. It’s more trustful than human and
reduce corruption too. It can be represented as a camera that record everything inside a shop.
This project is based on the implementation of a keylogger software who can help a specific user
to track keystroke on a computer system in term of cyber security. A software that will be able to
save whatever happens in the computer and send data to a specific email or server (Mostly on an
online drive). It takes a few minutes to install it in the victim’s system as software, from that time
the attacker will get every single activity from the victim’s computer. Everything that happen in
the victim computer (Keystroke) is saved. The activity can be saved in the victim’s system or it
can be send to the attacker email or can be uploaded to a chosen server.
In this project, as it is for non-malicious purpose the data will be keep in the victim computer so
then he will be able to find them and check the keystroke typed on his own system.
Introduction:
In Computer science, is very important. As said Martina Navratilova “Security used to be an
inconvenience sometimes, but now it’s a necessity all the time. “It’s the computer police. Cyber
security is the fact of defending computers, servers, mobile devices, electronic systems, networks,
and data from malicious attacks. It's also called by information technology security or electronic
information security. The term depends of the concept, from business to mobile computing, and
can be divided into a few common categories.
Network security, is a set of technologies that protects the usability and
integrity of a company's infrastructure by preventing the entry or proliferation
within a network of a wide variety of potential threats.
Application security, keep software and devices free of threats. A
compromised application could provide access to the data its designed to
protect. Successful security begins in the design stage, well before a program
or device is deployed (Our main topic).
Information security. protects the privacy of data