Password Capture,system security,Capture


Password Capture
Password Capture,system security

lAnother attack involves password capture
–watching over shoulder as password is entered
–using a trojan horse program to collect
–monitoring an insecure network login
leg. telnet, FTP, web, email
–extracting recorded info after successful login (web history/cache, last number dialed etc)
lUsing valid login/password can impersonate user
lUsers need to be educated to use suitable precautions/countermeasures

0 comments:

Post a Comment

Social Profiles

Twitter Facebook Google Plus LinkedIn RSS Feed Email Pinterest

Popular Posts

About Computer Engineering

softwares

Lectures

CIT4free

VIST HERE

Blogroll

About

Copyright © COMPUTER AND INFORMATION TECHNOLOGY | Powered by Blogger
Design by CIT4free