1) Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals. 300 words
2) Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.
Link : https://learn-us-east-1-prod-fleet01-xythos.s3.amazonaws.com/5b75a0e7334a9/572494?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%277-CEHv9%2520Module%252005%2520System%2520Hacking.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200630T180000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PLTYPZRQMY%2F20200630%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=89cfc17a7faee2b1f98092f72cc4ab5736466b848309b92115d17cfcd0217a80
3) Describe some ways that an organization can recover it’s IT resources from a disaster. What controls should have been in place in order to be able to retrieve this data? 300 words