Shoulder Surfing
In computer security, shoulder surfing refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. Shoulder surfing is particularly effective in crowded places because it’s relatively easy to observe someone as they enter passwords on a computer, fill out a form or enter their PIN at an automated teller machine (ATM).
Shoulder surfing can also be done at a distance using binoculars or other vision-enhancing devices. Inexpensive, miniature closed circuit television cameras can be concealed in ceilings, walls or fixtures to observe data entry.
To prevent shoulder surfing, these papers describe some techniques:
- http://www.ijsrp.org/research_paper_dec2011/ijsrp-dec-2011-08.pdf
- http://www.ijarcce.com/upload/2015/march-15/IJARCCE%2087.pdf
- http://ijsetr.org/wp-content/uploads/2015/02/IJSETR-VOL-4-ISSUE-2-330-335.pdf
- http://research.ijcaonline.org/volume114/number19/pxc3902031.pdf
- http://ijarcsms.com/docs/paper/volume2/issue10/V2I10-0058.pdf
- http://www.ijera.com/papers/
Vol5_issue3/Part%20-%205/ M503056064.pdf - http://esatjournals.org/
Volumes/IJRET/2015V04/I01/ IJRET20150401008.pdf - http://ijartet.com/papers/
NCRIT15/V02S170327.pdf - http://www.ijrdet.com/files/
Volume2Issue4/IJRDET_0414_23. pdf - http://www.ijert.org/view-pdf/
4591/an-authentication-system- for-information-security- using-cued-click-point-and- one-time-session-key - http://www.ijcsit.com/docs/Volume%205/vol5issue02/ijcsit20140502293.pdf
- http://www.hindawi.com/journals/tswj/2014/838623/
https://cups.cs.cmu.edu/soups/2011/proceedings/a6_Zakaria.pdf- http://www.rroij.com/open-access/implementing-black-hole-password-entrytechnique-for-mitigating-shouldersurfing-threat.pdf
- http://www.jetir.org/papers/JETIR1407015.pdf
No comments:
Post a Comment