Ethical keylogger solution for monitoring user activities in cybersecurity networks

Blessing Nwamaka Iduh *, Maryrose Ngozi Umeh, Roseline Uzoamaka Paul and Ogochukwu Patience Okechukwu

Department of Computer Science, Nnamdi Azikiwe University, Awka, Anambra State, Nigeria.
 
Research Article
World Journal of Advanced Engineering Technology and Sciences, 2024, 12(01), 095–101.
Article DOI: 10.30574/wjaets.2024.12.1.0195

 

Publication history: 
Received on 05 April 2024; revised on 13 May 2024; accepted on 16 May 2024
 
Abstract: 
This paper presents the development of a software keylogger to monitor user activities within a cyber network, enhancing security and facilitating comprehensive cybersecurity analysis. Guided by the agile methodology, the work adopts a flexible and iterative approach to development, ensuring continuous collaboration, adaptation to evolving requirements, and swift response to feedback. Leveraging the versatility and efficiency of the Python programming language, this work transforms the traditional notion of a keylogger, which is a program that records keystrokes, into an ethical and legally compliant tool. By capturing and logging keystrokes, the system provides valuable insights into user behavior and potential security threats, enabling proactive measures to prevent cyber-attacks and data breaches. Prioritizing transparency and consent, the system design adheres to ethical standards and privacy regulations, ensuring the protection of sensitive information and user privacy. This technical solution offers cybersecurity professionals, system administrators, and organizations a valuable tool for network monitoring while showcasing responsible development practices and contributing to the advancement of ethical cybersecurity solutions.
 
Keywords: 
Keyloggers; Cybersecurity; Cyber Attacks; Network Security; Software Keyloggers
 
Full text article in PDF: