SECURITY MEASURES OF RANDVUL KEYBOARD

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

Phishing is a “con trick” by which consumers are sent email urporting to originate from legitimate services like banks or ther financial institutions. Phishing can be thought of as the marriage of social gineering and technology. The goal of a phisher is typically to learn information that allows him to access resources elonging to his victims. The most common type of phishing attack aims to obtain account numbers and passwords used for online banking, in order to either steal money from these ccounts or use them as “stepping stones” in money laundry schemes. In the latter type of situation, the phisher, who may belong to a riminal organization or a errorist organization, will transfer money between accounts hat he controls (without stealing money from either of them) in order to obscure the actual flow of funds from some payer to ome payee. Phishing is therefore not only of concern for otential victims and their financial institutions, but also to ociety at large[1]. In hacker's worlds, there is something called 'Key Logger'. The purpose of key logger is to log every key that you type in your keyboard, this includes every single personal nformation that you have typed in your keyboard while you surf he Net such as log in into your online banking. Once your assword has been logged, the hacker can use your nformation to their benefit[2]. Using Virtual Keyboard which ontains randomly generated keys adds another security layer o authenticate yourself to their system. Virtual Keyboard works just like regular keyboard, one thing is you don't type it in your keyboard. Rather, you will be using your mouse to type the assword by using virtual keyboard[3] .

Authors and Affiliations

Radha Damodaram , Dr. M. L. Valarmathi

Keywords

Related Articles

Cryptography for Resource Constrained Devices: A Survey

Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight c...

On high order methods for solution of nonlinear equation

The objective of this paper is two folds, first to derive a new series of third order methods for solving non-linear equation f(x)=0 involving third, fourth and fifth derivatives of f and secondly to compare the existing...

An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing 

The design and maintenance of the XML schemas for the enterprise, if done incorrectly, can be difficult and frustrating experience. The applications that use XML data binding or participate in the processing of large and...

AHP and Group Decision Making for Access Network Selection in Multi-Homed Mobile Terminals

The evolving fourth generation wireless networks provide heterogeneous wireless access. This feature enables the multi homed mobile devices to seamlessly roam across various wireless access technologies and to connect al...

A Review of Feature Selection Algorithms for Data Mining Techniques 

Feature selection is a pre-processing step, used to improve the mining performance by reducing data dimensionality. Even though there exists a number of feature selection algorithms, still it is an active research area i...

Download PDF file
  • EP ID EP97257
  • DOI -
  • Views 144
  • Downloads 0

How To Cite

Radha Damodaram, Dr. M. L. Valarmathi (2010). SECURITY MEASURES OF RANDVUL KEYBOARD. International Journal on Computer Science and Engineering, 2(3), 619-625. https://europub.co.uk/articles/-A-97257