Figure 2 - uploaded by Monark Bag
Content may be subject to copyright.
Presence of keyloggers  

Presence of keyloggers  

Source publication
Article
Full-text available
The keyloggers are covert security threat to the privacy and identity of users. The attackers are exploring different techniques of keylogging using hardware keyloggers, software keyloggers and screen capturing software to steal the user sensitive data. The Incognizance of the user is imposing greater risk. To overcome this problem, we have propose...

Context in source publication

Context 1
... we asked how many of them knew how to check presence of keyloggers and screen recording softwares installed on a machine being used. The response to this question was a concern as most of them did not bother to check or does not know how to check them (74% were saying this) as shown in Figure 2. As per our survey 93.3% people needs a solution to this problem. ...

Similar publications

Article
Full-text available
Nowadays, vehicle theft has been increased drastically all over the world. The prevention of vehicle theft is essential to enhance vehicle security. A large number of vehicles have been stolen for the lack of essential foundation and administration of a secure platform. Several existing systems were developed to protect the vehicle from unauthorize...

Citations

... After reviewing existing detection systems, the authors have listed some preventative tactics and reviewed the most popular keylogger types and ways used to conceal them on a disruptive user's computer. In [12], a novel USB bulk storage unit authenticated anti-key-logging method is provided by utilizing the idea of generating passwords on the insecure machine as a response to keyloggers and screen recording applications. It can be concluded that the model significantly boosts its security, making it tough for any kind of security breach. ...
... Education is the key to success in the future development process for the Indonesian nation [1]. Education is one of the essential things in human life. ...
... Keylogging has grown a built-up apparatus utilized by aggressors for obtaining passwords and other classified information. For programmers, yet besides for others, for example, departmental heads for frameworks, recognizing dubious movement [4] [6]. In investigating, for various territories, for example, for a look into by guardians for checking their youngsters and recognizing uncommon practices and to distinguish lawbreakers. ...
... Shifting the workforce who understands technology adds to the burden of relearning and can manage the knowledge gained in a digital [18]. From data above, this research showed that with this problem, the universities and with the support of interview from the respondents must train the members to understand knowledge management so all of data must be in documented management systems which campus should make the infrastructures such as to store the company documents on the cloud, share them and control access permission at a granular level [9]; [12]; [20]. The training may take longer time, with teach transfer to the members of university whose members are complex individuals and have different way of difficulty, the training will help the members to comprehend the idea and it will apply to their knowledge to solve a real-work problems [19]; [1]; [21]. ...
Conference Paper
Full-text available
The use of digital literacy as a knowledge and add the value of innovation are the purpose of this research which is needed in 4.0 Industrial Revolution. By sharing, applying and creating knowledge are the valuable lesson learned to foster continued of learning organization. The fact is many of the educators, lecturers, staff members of universities, technicians and students have difficulty in managing the knowledge of digital literacy and the impact is to lose the opportunities in the era of Industrial Revolution 4.0. There are 142 respondents of the research which are from lecturers, staff member of universities, technicians and students from several university in Tangerang City, Banten, Indonesia. The method of the research is mixed-method of quantitative and qualitative. The result of the research is most of the respondents (111 respondents or 78%) moved to manage the new literacies and the other of (31 respondents or 22% tried to manage themselves to manage the knowledge of digital literacies. This research found that losing digital literacy knowledge would lead to a loss of opportunity in 4.0 Industrial Revolution era.
... People are required to manage multiple accounts each demanding them to remember specific credentials to enjoy the facilities. This eventually leads to the selection of easily memorable passwords, which can be easily exploited by intruders using numerous password hacking technologies while being vulnerable to dictionary and rainbow table attacks [2,14,15,34,36,54]. Humans constitute the weakest link in any security mechanism, thus breaching the systems offering the highest security. ...
... Eventually, the individual users end up choosing simple passwords for easy memorization and in worst cases tend to use the same passwords for accessing all the services, resulting in increased vulnerability to fraud. Further, the availability of numerous password hacking tools, copious key-logger software and dictionary attacks have added to possibilities of violation [3,24,49,51,56,73,76]. Moreover, passwords can be easily forgotten, observed or shared, thus, forming an impractical security solution. ...
Chapter
A growing trend exerted by current users in accessing sensitive data and performing critical data exchanges predominantly highlights the proliferation usage of mobile phone devices by users for accessibility. There exists a demand for a security solution capable of thwarting the existing threats while offering extended support, at the same time conserving user adaptability. In this research, an intensive survey has been conducted in which various security solutions based on biometric and non-biometric access management schemes have been contemplated. A lack of absolute or standard access control management scheme capable of delivering a secure and feasible solution on mobile phones persists. Each of the works offered by researchers has been single-handedly evaluated. Finally, loopholes and open challenges were deduced from the study conducted.
... Existing digital application services require a multitude of credentials in the form of PINs and passwords to be remembered by individual users resulting in higher proclivity of unsafe password selection by users for easy memorisation, which proves to be as one of the considerable concerns associated with it [11]. However, in the current era, rapid modernisation and development in computing technology, susceptibility to dictionary attacks [12], copious key-logger [13] and password hacking tools are [14], [15], making password retrieval an easier task for intruders. Further, passwords can be shared, forgotten or observed thus forming an impractical authentication solution. ...
Research
Full-text available
The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ones. The need for such a security solution persists that should be able to thwart not only the contemporary threats but also offer continued support without bowing down to progression in technology. Though some security solutions have been contemplated, a lack of standardised or absolute security solution which can provide a feasible and secure solution to mobile phones exists. In this paper, a survey based on various biometric and non-biometric access management schemes has been performed. The copious solutions put forward by researchers so far were discovered to fail in traits like user adaptability and efficiency. Each of the works put forward by various researchers has been single-handedly contemplated followed by analysis. Ultimately, open problems and challenges were inferences from the survey conducted.
... Keylogger is a device either hardware or software used to monitor keyboard keystrokes [9] [10]. A keylogger will usually store the monitoring results of the keyboard keystrokes into a log/record/record file. ...
Article
Full-text available
The development of technology is very fast, especially in the field of Internet technology that at any time experiencing significant changes, The development also supported by the ability of human resources, Keylogger is a tool that most developed because this application is very rarely recognized a malicious program by antivirus, keylogger will record all activities related to keystrokes, the recording process is accomplished by using string matching method. The application of string matching method in the process of recording the keyboard is to help the admin in knowing what the user accessed on the computer.
... The spear phishing attacks start with the attacker collecting information about the organization and end with getting access to the required information. Figure 10 shows the steps involved in spear phishing [48]. ...
... Hardware key loggers: Hardware key loggers are devices that record the data that are entered via keyboards into their memory and do not make use of any resources of the system as any anti-viral software cannot recognize them, and also these are very small in size and hide themselves well in a system, and they may send key hits to some attacker at remote location [48]. 2. Software key loggers: Software key loggers examine the data of the operating system and the data entered through keyboard of the victim's system and record them at remote locations which are later sent to the attacker. ...
... 2. Software key loggers: Software key loggers examine the data of the operating system and the data entered through keyboard of the victim's system and record them at remote locations which are later sent to the attacker. Virtual keyboards are helpful and are not affected by these softwares as virtual keyboard data are entered by a mouse [48,52]. 3. Screen recording software: Screen recording software captures the screen and mouse movements for monitoring. ...
Article
Full-text available
In the last few years, phishing scams have rapidly grown posing huge threat to global Internet security. Today, phishing attack is one of the most common and serious threats over Internet where cyber attackers try to steal user’s personal or financial credentials by using either malwares or social engineering. Detection of phishing attacks with high accuracy has always been an issue of great interest. Recent developments in phishing detection techniques have led to various new techniques, specially designed for phishing detection where accuracy is extremely important. Phishing problem is widely present as there are several ways to carry out such an attack, which implies that one solution is not adequate to address it. Two main issues are addressed in our paper. First, we discuss in detail phishing attacks, history of phishing attacks and motivation of attacker behind performing this attack. In addition, we also provide taxonomy of various types of phishing attacks. Second, we provide taxonomy of various solutions proposed in the literature to detect and defend from phishing attacks. In addition, we also discuss various issues and challenges faced in dealing with phishing attacks and spear phishing and how phishing is now targeting the emerging domain of IoT. We discuss various tools and datasets that are used by the researchers for the evaluation of their approaches. This provides better understanding of the problem, current solution space and future research scope to efficiently deal with such attacks.
... This includes removing remote access (i.e., accessing one's work computer from home) configurations when they are not needed in addition to using a strong firewall (Beierly 2010). Users need to continually check their devices for unfamiliar hardware attached to mice or keyboards as well as check the listings of installed software (Adhikary et al. 2012;Beierly 2010). Many financial organizations are opting for virtual keypads and virtual mice, especially for online transactions (Kumar 2009). ...
Chapter
Full-text available
Keystroke capture (KC) tracks a computer or mobile device users’ keyboard activity using hardware or software. KC is used by businesses to keep employees from misusing company technology, in families to monitor the use possible misuse of family computers, and by computer hackers who seek gain through secretlypossessing an individual’s personal informationand account passwords. KC software can be pur-chased for use on a device or may be placed maliciously without the user’s knowledge throughcontact with untrusted websites or e-mail attachments. KC hardware can also be purchased and is disguised to look like computer cords and accessories. KC detection can be difficult because software and hardware are designed to avoid detection by anti-KC programs. KC can beavoided by using security software as well asthrough careful computing practices. KC affectsindividual computer users as well as small,medium, and large organizations internationally.