FA 2019-BSIT-043 Hammad Arif

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Cyber Security

Assignment #2

Submitted To
Ma’am Rabia Aslam Khan
Submitted By

Hammad Arif (FA-19/BSIT/043)

Faculty of Computer Science


Dept. of Information Technology
LGU Main Campus, Sector C DHA Phase 6, Lahore
Q: 1
Use the Internet to research different keyloggers. Create a table that lists five different hardware
keyloggers, their available memory, specific features, and their cost. Then create another table of
five different software keyloggers with their features. Are you surprised at the functionality of
these devices? Write a summary of your findings.

Answer:
Hardware key loggers:
Key loggers Available Specific Features Cost
Memory
Key Grabber 2GB to 16GB Easy to Install, Stealth Mode, Wi-Fi Access, Time $49.00 -
USB and Date Stamp $169.00
Keyllama 2MB to 8MB Password Protection, USB Connectivity, Hidden $54.99 -
Mode, Works with Any OS, No Software Needed. $99.99
Forensic 8MB Keyboard scanning, power cut protection, time $395.00
Keylogger and date stamping, covert installation.
KeyGrabber 2GB to 16GB No software or drivers are needed for Key $39.00 -
PS/2 Grabber Invisible to the Operating System, 2 $169.00
Million Keystroke Memory. Little Size
AirDrive 8MB to 16GB WiFi Connectivity, Email Reports, USB Flash $69.00 -
Keyloggers Drive Mode, and Web Configuration for Air Drive $179.00
Key loggers.

Software keyloggers:
Key loggers Specific Features

Refog Screenshots, website and application blocking, email reporting, social media
monitoring, and password capture are all features of Refuge.

Syprix Syprix Record keystrokes, watch the clipboard, take screenshots, check social media,
block websites, and send email reports.
Ardamax Keystroke logging, website and application tracking, clipboard logging, screenshot
capture, microphone recording, and email reports are all features of Ardamax.
Revealer Keystroke logging, screenshots, website and application tracking, password capture, and
email reports revealed.
Kidlogger Keystroke logging, screenshots, social media monitoring, GPS tracking, app blocking,
and email reports are all features of Kid logger.

Both hardware and software key loggers offer sophisticated features such as keystroke tracking,
screen capture, and email reporting. However, some hardware key loggers have exceptional
features such as WiFi connectivity, stealth installation, and power failure protection. Depending
on their functionality and memory capacity, these key loggers have a wide price range. It is
important to note that using key loggers to monitor someone without that person's permission or
knowledge may be against the law. Care should therefore be taken when using these devices.

Question: 2
Phishing emails can often be difficult to detect. Point your web browser to
survey.mailfrontier.com/survey/quiztest.cgi and then click on The MailFrontier Phishing IQ Test
v 2.0. Click each hyperlink to view the email message or web page and then decide if it is
phishing. When you're done, your score will be displayed along with an explanation of why it is
or isn't a phishing example. Then click on The Mail Frontier Phishing IQ Test to take another
phishing test. Did what you learned on the first test help you? Did your score improve on this
test? Write a one-paragraph summary of what you learned about phishing in this test.

Answer:
People can improve their ability to spot phishing attempts by taking the Mail Frontier Phishing
IQ Test. The exam informs people about typical phishing email techniques, such as urgent
requests for personal information or suspicious web addresses. Individuals can protect
themselves from phishing attacks by being more careful and cautious when reading emails or
clicking on links after being aware of these techniques. Frequent participation in phishing tests
can help one better detect and avoid phishing attacks, which is essential to protect sensitive and
private data.

Question: 3
What can organizations do to combat typos? Explore the internet to see how companies are
combating this growing problem. How can these squatting site typos be removed? What does the
company have to do to stop these sites? Also, why was it so hard to do? What proactive steps can
the company take? Write a one-page report about your research.

Answer:
Typo squatting is a growing problem that has the potential to harm individuals and organizations
alike. It occurs when attackers register domain names similar to legitimate ones, often with the
intention of tricking individuals into divulging sensitive information or downloading malware.
To combat typos, organizations can take proactive steps such as monitoring new domain
registrations, registering multiple domain name variations, and implementing measures to detect
and block malicious sites. Companies can also combat typos by filing complaints with relevant
authorities, such as the Internet Corporation for Assigned Names and Numbers (ICANN), or by
taking legal action against malicious actors. In order to remove the typos, companies must prove
that the sites are infringing their intellectual property rights or engaging in fraudulent activity.
Stopping sites with typos can be difficult because attackers often use techniques such as domain
privacy services to hide their identity and prevent detection. Additionally, some countries have
less stringent laws regarding domain name registration and ownership, making it easier for
malicious actors to register domains with typos.
In short, organizations can take proactive steps to combat typos, such as monitoring new domain
registrations and registering multiple variations of their domain name. Companies can also take
legal action or file complaints with the authorities to have misspelled squatting sites removed.
Despite the difficulty in stopping typos, companies can protect themselves by being vigilant and
taking steps to prevent and detect potential attacks.

You might also like