Literature Review

Read Complete Research Material

LITERATURE REVIEW

Literature Review



Literature Review

Keystroke Logging

A keystroke logging program can be software-based, and this is typically part of an extensive computer security system or part of a piece of malicious software (malware). Some people use security software on their computers to ensure that children cannot access certain websites or spend money online, or to ensure that employees are not wasting time online while at work. Some of these programs can include keystroke logging as a feature, typically intended to track the activities of unsupervised minors and employees using the computer. (Schilperoord 1996)

Certain hardware devices can be used as keystroke loggers. These devices are plugged in between the cord of a keyboard and the input on a computer tower and are similar in size and appearance to a keyboard adapter plug. Keystroke logging hardware can be especially troublesome because the information is logged by the device before it ever actually reaches the computer, so computer security software is useless against these types of devices. Fortunately, these devices can typically be seen by casual inspection of a computer and should be watched for whenever a person is using a public computer. (Torrance, Waes & Galbraith 2007)

Some keystroke logging, however, is performed by malicious programs such as Trojan horses or other types of malware. These programs are typically intended to log the keystrokes of a computer user as he or she enters account numbers, passwords, and other sensitive information. The data can then be remote accessed or sent to a specific email address or Internet protocol (IP) address that is owned by the malware designer. (Sullivan & Lindgren 2006) This data can then be used to access the accounts and can even be used to change passwords and keep the legitimate user from accessing his or her information.

Though some computer security programs can detect these types of malicious keystroke loggers, no single program is always a perfect defense against such practices. Much like avoiding any other piece of malware, caution should be taken by computer users whenever opening mail from someone they do not know, or following suspicious links in email and on Internet websites. Using antivirus and antimalware programs, and keeping them constantly updated, is also a great way to better detect programs such as keystroke logging malware and remove them before private information is compromised. (Cheng & Barone 2007)

A brief inspection of any text on Cognitive Science reveals that the perception, storage, retrieval and transformation of information by the cognitive architecture have been extensively studied but the transmission of information has been rather neglected. Much less is known about how chunks of information in the mind are processed for external production than is known about the other fundamental types of cognitive processes. For example, write “All for one, one for all” in capital letters. What processes are occurring during the ˜10 seconds during which the sentence is being transmitted from your mind to the paper? Do the processes occur in a largely serial fashion or do they partly overlap and even run ...
Related Ads