Christopher A. Wood

Keyloggers in Cybersecurity Education

C. A. Wood and R. K. Raj

2010 International Conference on Security & Management, Las Vegas, Nevada, USA. July 2010



Keylogger programs attempt to retrieve confi- dential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, often for malicious purposes. Keyloggers thus pose a major threat to business and personal activities such as Internet transactions, online banking, email, or chat. To deal with such threats, not only must users be made aware about this type of malware, but software practitioners and students must also be educated in the design, implementation, and monitoring of effective defenses against different keylogger attacks. This paper presents a case for incorporating keylog- ging in cybersecurity education. First, the paper provides an overview of keylogger programs, discusses keylogger design, implementation, and usage, and presents effective approaches to detect and prevent keylogging attacks. Second, the paper outlines several keylogging projects that can be incorporated into an undergraduate computing program to educate the next generation of cybersecurity practitioners in this important topic.


 title={Keyloggers in Cybersecurity Education.},
 author={Wood, Christopher and Raj, Rajendra},
 booktitle={Security and Management},