{"title":"击键日志:强密码足够吗?","authors":"Darshanie Sukhram, T. Hayajneh","doi":"10.1109/UEMCON.2017.8249051","DOIUrl":null,"url":null,"abstract":"As hackers develop sophisticated phishing and social engineering attacks, it is recommended that users be aware of common tactics and implement stronger and unique passwords for sensitive accounts. Malware typically involved in cyber-attacks includes viruses and worms. Keyloggers are designed to track and capture keystrokes made on devices. They are not given the same priority as the other types of malware, but are also considered malicious as it poses the same level of risk. Having a strong password in this instance does not provide a high level of protection as keyloggers will log each key typed. This paper will discuss the characteristics of keylogging software while providing a summary on methods of protection. Three keylogging software are tested against two anti-keylogging programs to identify what information is captured and which method of protection is stronger. A discussion on risk assessment with regards to keyloggers and remediation techniques is also included.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"KeyStroke logs: Are strong passwords enough?\",\"authors\":\"Darshanie Sukhram, T. Hayajneh\",\"doi\":\"10.1109/UEMCON.2017.8249051\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As hackers develop sophisticated phishing and social engineering attacks, it is recommended that users be aware of common tactics and implement stronger and unique passwords for sensitive accounts. Malware typically involved in cyber-attacks includes viruses and worms. Keyloggers are designed to track and capture keystrokes made on devices. They are not given the same priority as the other types of malware, but are also considered malicious as it poses the same level of risk. Having a strong password in this instance does not provide a high level of protection as keyloggers will log each key typed. This paper will discuss the characteristics of keylogging software while providing a summary on methods of protection. Three keylogging software are tested against two anti-keylogging programs to identify what information is captured and which method of protection is stronger. A discussion on risk assessment with regards to keyloggers and remediation techniques is also included.\",\"PeriodicalId\":403890,\"journal\":{\"name\":\"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON.2017.8249051\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON.2017.8249051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
As hackers develop sophisticated phishing and social engineering attacks, it is recommended that users be aware of common tactics and implement stronger and unique passwords for sensitive accounts. Malware typically involved in cyber-attacks includes viruses and worms. Keyloggers are designed to track and capture keystrokes made on devices. They are not given the same priority as the other types of malware, but are also considered malicious as it poses the same level of risk. Having a strong password in this instance does not provide a high level of protection as keyloggers will log each key typed. This paper will discuss the characteristics of keylogging software while providing a summary on methods of protection. Three keylogging software are tested against two anti-keylogging programs to identify what information is captured and which method of protection is stronger. A discussion on risk assessment with regards to keyloggers and remediation techniques is also included.