Zebua et al., 2023 - Google Patents
Keylogger Threats in Computer Security AspectsZebua et al., 2023
View PDF- Document ID
- 868683185683109574
- Author
- Zebua D
- Pamungkas B
- Prayogi H
- Muhammad R
- Wahyudi S
- Samudra W
- et al.
- Publication year
- Publication venue
- International Journal of Integrative Sciences
External Links
Snippet
Along with the development of increasingly advanced technology, the level of need for information security is very important. With the development of information, new problems arise regarding computer security, an example of computer security that often occurs is data …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/18—Packaging or power distribution
- G06F1/181—Enclosures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Biju et al. | Cyber attacks and its different types | |
Kamruzzaman et al. | A comprehensive review of endpoint security: Threats and defenses | |
Alharbi | Dealing with Data Breaches Amidst Changes In Technology. | |
Mubeen et al. | Strategies to Avoid Illegal Data Access | |
Ahmed et al. | Survey of Keylogger technologies | |
Ruhani et al. | Keylogger: The unsung hacking weapon | |
Newman | Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities | |
Fu et al. | Analysis of botnet counter-counter-measures | |
Zebua et al. | Keylogger Threats in Computer Security Aspects | |
Guvçi et al. | An Improved Protection Approach for Protecting from Ransomware Attacks | |
Prayogi et al. | Keylogger Threats in Computer Security Aspects | |
Stoleriu et al. | Modern Cyber Security Attacks, Detection Strategies, and Countermeasures Procedures | |
Ibor et al. | System hardening architecture for safer access to critical business data | |
Tyagi et al. | A novel framework for password securing system from key-logger spyware | |
Lessambo | The cybersecurity counteroffensive | |
Vishnani et al. | An in-depth analysis of the epitome of online stealth: keyloggers; and their countermeasures | |
Sharma et al. | Detecting and Defending Keystroke Logger Attacks | |
Asamoah | Antivirus software versus malware | |
Jøsang | Attack Vectors and Malware | |
Sawyer | Potential threats and mitigation tools for Network Attacks | |
Mane et al. | CYBER MALWARES AND ATTACK WORKFLOW. | |
Kushwah | Navigating the Cybersecurity Landscape: Vulnerabilities, Mitigation Strategies and Future Outlooks. | |
Datta | Key Logger and | |
Pai et al. | A Study Keen on Computer Network Security Concerns | |
Frățilă | Analysis of Computer Malware and Common Attacks |