Site Options:
Kadix
Keylogging Ontology
Concepts
Concepts include ideas, abstractions of topics, and units of thought or knowledge. These topics contain mainly non-proprietary information that is relevant to MobileTrust.
Scope: Endpoint Security, Malware
-
Authentication
Authentication is the process of identifying a user during login. -
Authorization
Authorization verifies what the user is authorized to do after logging into a website, network, or cloud service. -
Encryption
Encryption is the transformation of data, so that a key is required to decrypt and restore the original data. -
Encryption Key
An Encryption Key is a random set of keyboard characters generated specifically to encrypt and un-encrypt data. -
End-to-End Encryption
End-to-End Encryption ensures that data that travels over a network or the internet is securely encrypted from the point of data entry to the point of destination. -
Keylogger
A Keylogger is hidden software that records all keystrokes including passwords. -
Keylogger Types
There are two main types of keyloggers:
Software-based.
Hardware-based.
The topic/theme is software-based keyloggers and their typology. -
Keystroke Encryption
Keystroke Encryption uses a custom keyboard driver to pass keystrokes directly to the browser in an encrypted format. -
Out-of-Band Authentication (OOBA)
Out-Of-Band Authentication involves using a second channel for communication of passwords or codes, that is not linked to the original communication channel used to access a website, network, or cloud service. -
Single Sign-On (SSO)
Single Sign-On Authentication. -
Strong Password
Password strength can be measured by the effectiveness of a password in resisting guessing and brute-force attacks. -
Token-Based Authentication
Token-Based Authentication users log into to a website, network, or cloud service, using a security token provided by the server. -
Two-Factor Authentication
Two-Factor Authentication requires the use of two of three authentication factors. These factors are identified in the Standards and Regulations for access to U.S. Federal Government systems.
Related Information:
Keylogging Ontology
Problem & Solution
MobileTrust: FAQs