[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zebua et al., 2023 - Google Patents

Keylogger Threats in Computer Security Aspects

Zebua et al., 2023

View PDF
Document ID
868683185683109574
Author
Zebua D
Pamungkas B
Prayogi H
Muhammad R
Wahyudi S
Samudra W
et al.
Publication year
Publication venue
International Journal of Integrative Sciences

External Links

Snippet

Along with the development of increasingly advanced technology, the level of need for information security is very important. With the development of information, new problems arise regarding computer security, an example of computer security that often occurs is data …
Continue reading at journal.formosapublisher.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/18Packaging or power distribution
    • G06F1/181Enclosures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Similar Documents

Publication Publication Date Title
Biju et al. Cyber attacks and its different types
Kamruzzaman et al. A comprehensive review of endpoint security: Threats and defenses
Alharbi Dealing with Data Breaches Amidst Changes In Technology.
Mubeen et al. Strategies to Avoid Illegal Data Access
Ahmed et al. Survey of Keylogger technologies
Ruhani et al. Keylogger: The unsung hacking weapon
Newman Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities
Fu et al. Analysis of botnet counter-counter-measures
Zebua et al. Keylogger Threats in Computer Security Aspects
Guvçi et al. An Improved Protection Approach for Protecting from Ransomware Attacks
Prayogi et al. Keylogger Threats in Computer Security Aspects
Stoleriu et al. Modern Cyber Security Attacks, Detection Strategies, and Countermeasures Procedures
Ibor et al. System hardening architecture for safer access to critical business data
Tyagi et al. A novel framework for password securing system from key-logger spyware
Lessambo The cybersecurity counteroffensive
Vishnani et al. An in-depth analysis of the epitome of online stealth: keyloggers; and their countermeasures
Sharma et al. Detecting and Defending Keystroke Logger Attacks
Asamoah Antivirus software versus malware
Jøsang Attack Vectors and Malware
Sawyer Potential threats and mitigation tools for Network Attacks
Mane et al. CYBER MALWARES AND ATTACK WORKFLOW.
Kushwah Navigating the Cybersecurity Landscape: Vulnerabilities, Mitigation Strategies and Future Outlooks.
Datta Key Logger and
Pai et al. A Study Keen on Computer Network Security Concerns
Frățilă Analysis of Computer Malware and Common Attacks