ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Two Level Graphical Authentication Against Key-logger Spyware & Mouse Tracker

Journal: Iord journal of science & technology (Vol.01, No. 03)

Publication Date:

Authors : ; ; ; ; ;

Page : 26-33

Keywords : key-logger; spyware; authentication;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Day by day, password security is major issue in computer security. There are different way for hacking password such as spyware and key logger. Your pc activities are monitor by the spyware. Spyware just like malware, it collects personal information which sites are visited by user and for how long. Spyware has several ways of infection. A common method is by “piggy-backing” on software downloads. Another is key-logger; a key logger is basically spyware. As indicated by its name sake, it “logs” or records your keystrokes. Keystrokes are collected in a temporary file, which is then periodically uploaded to the author’s location over the internet. For this, we have come up to graphical authentication schemes. There are two techniques in graphical authentication i.e session password authentication and image based authentication. Session passwords can be used only once and every time a new password is generated. Image password can easy to remember.

Last modified: 2014-07-14 00:36:16