Abstract
There are many places along the path from a user to a web site where the user’s private information may be stolen. Although the “private information” can be anything, we focus on authentication credentials for simplicity: a username and password. It could be argued that the password is really the more sensitive piece of information between the two, so we will further focus on password theft. It will be assumed for now that a password is typed on the keyboard, although we will discuss later how that assumption is relaxed, and why.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Aycock, J. (2011). Keylogging. In: Spyware and Adware. Advances in Information Security, vol 50. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-77741-2_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-77741-2_4
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-77740-5
Online ISBN: 978-0-387-77741-2
eBook Packages: Computer ScienceComputer Science (R0)