Keyloggers in Cybersecurity Education
نویسندگان
چکیده
Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, often for malicious purposes. Keyloggers thus pose a major threat to business and personal activities such as Internet transactions, online banking, email, or chat. To deal with such threats, not only must users be made aware about this type of malware, but software practitioners and students must also be educated in the design, implementation, and monitoring of effective defenses against different keylogger
منابع مشابه
Using Cybersecurity Education Tool Assessment Method to Measure the Effective of Different Teaching Methods
In this paper, we present two teaching methods that are control group teaching and experimental group teaching to show how using Cybersecurity education tools to help students learn related topics. We develop an effective Cybersecurity Education Tool Assessment Method (CETAM) to measure effective of the teaching methods and evaluate these education tools. We adopt two different teaching methods...
متن کاملInstructional Perspective: Towards an Integrative Learning Approach in Cybersecurity
This paper describes a multifaceted approach to cybersecurity education based on integrative learning theory. We emphasize the need to focus on curriculum, experiential learning techniques, assessment and fostering a community of practice. The need to build conceptual, tactical and practical skills among cybersecurity professionals is highlighted. The paper will include examples of how integrat...
متن کاملCybersecurity Through Secure Software Development
Reports about serious vulnerabilities in critical IT components have triggered increased focus on cybersecurity worldwide. Among the many initiatives to strengthen cybersecurity it is common to see the establishment and strengthening of CERTs and other centers for cybersecurity. On the other hand, strengthening education in IT security and applying methods for secure systems development are met...
متن کاملA Novel Approach to Deal with Keyloggers
Keyloggers have been widely used by hackers as a tool to steal information and passwords from users in e-commerce. The malware security software has also grown but keylogger grow too. This article reviews some of the techniques used by hackers to spread Keyloggers and bypass various security techniques by using advanced Keyloggers and finally, we describe a novel approach to deal with Keylogger...
متن کاملCybersecurity Curricular Guidelines
The goal of the Joint Task Force on Cybersecurity Education is to develop comprehensive curricular guidance in cybersecurity that will support future program development and associated educational efforts. This effort is a collaboration among the ACM, the IEEE Computer Society, the AIS Special Interest Group on Security and Privacy (SIGSEC), the IFIP WG 11.8, and the Cyber Education Project. In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010