Literature review of key logger project
Document preview:
Introduction In the past years, access to information globally has become available at all time through the use of different network architectures and computers. Also, to the growth in chances of malicious attacks and intrusions have been in increase following a high innovation and high-level skills of the attackers. There exist multiple ways to highjack or hack users’ confidential information and sensitive data. Keyloggers are one of the most used methods to obtain users information, in which the users’ keystrokes are recorded and analyzed. Another method gaining fame is clickjacking. There also exists other inexpensive hardware keylogging devices like the Spy Keylogger that acts as a medium between the physical keyboard USB adapter and computer’s motherboard USB port.the Device captures and stores the user keystrokes on its memory. Also, the wireless hardware keyloggers have the capability to translate the information and store the encrypted keystroke information sent from a w...
Literature review of key logger project
This might be interesting
Can’t find the right project?
Our experts can help you get one from scratch.
Sign Up Studybay