Survey on Keyloggers A Monitoring Tool
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 4, Issue 6
Abstract
A Keylogger is a tool that is used to capture keystrokes and other sensitive details from a target computer such as Pin codes, Passwords and System Information and send the collected details to the attacker without the knowledge of the victim. Keyloggers poses a big threat to business transactions such as E commerce, email chats, online banking or the system database. There are legitimate uses for keylogger including parents monitoring their children and employers keeping an eye on the employees to make sure that they are working at the office time. This paper gives description about keyloggers, its types, the method they use and also how can we prevent the attack of a keylogger. Ajay Babu N V | Feon Jaison "Survey on Keyloggers: A Monitoring Tool" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35704.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/35704/survey-on-keyloggers-a-monitoring-tool/ajay-babu-n-v
Authors and Affiliations
Ajay Babu N V
Exploring the Role of Culture on Graphic Designs
Research never concludes because there is always a new perspective that remains unexplored; Somebody starts recognizes it and starts the process again to make a justified contribution. This research also began because of...
3D Point Cloud Storage Options A Comparison with a Kinect Data
In recent years, the concept of 3D point cloud, which is a new approach on this subject, has entered the literature. This concept, which is based on the representation of objects as 3D point for processing, analysis or p...
A Review on Green Cellular Network
Energy efficiency in the cellular network is a growing concern for cellular operators and with the exponential increase in mobile internet traffic driven by a new generation of wireless devices, future cellular networks...
Implementation of Women Safety System using Internet of Things
In today's world both men and women are having equal responsibility in their works and competing with each other in all the fields. Women face challenges in the workplace and safety become a major issue in most of the co...
Risk Assessment Model and its Integration into an Established Test Process
In industry, testing has to be performed under severe pressure due to limited resources. Risk based testing which uses risks to guide the test process is applied to allocate resources and to reduce product risks. Risk as...