Preview

Keyboard Hacking

Satisfactory Essays
Open Document
Open Document
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Keyboard Hacking
PROTECTION AGAINST HARDWARE
KEYBOARD HACKING DEVICES USING MICROPROCESSORS
ABSTRACT
Network security is a never ending battle between the system design engineers and the computer hackers. In an effort to keep the hackers out, engineers have developed an impressive array of encryption algorithms, authentication protocols and intrusion detection systems. The hackers have developed an equally impressive way of bypassing the security walls. However, both groups have continued to overlook one of the most vulnerable links in any computer network: the clients’ keyboard. Keyboards are still the input device of choice for the computers. A lot of “sensitive” information like the usernames, passwords, credit card information, etc., is passed through it. All keyboards perform the basic function of decoding the keystrokes to appropriate binary code that is read by the CPU. A small, easily purchased capture device can be attached to the computer keyboard port and can remain there for weeks, which can store decoded keystrokes directly from the keyboard and could reveal the sensitive information to the hacker. Thus the potential danger of having our network passwords and other important data stolen is always lurking around. So far, there hasn’t been a single wired keyboard that provides a solution to this problem. Probably, because this threat has been overlooked. The system of encrypting the data before transferring it through the port and later decrypting it solves this threat. So in this paper as a part we will look in detail about the keyboard capture devices & its threats to security. In the remaining half comes our ideas of securing the keyboard. If this is a success, then probably we could produce the first fully secured wired keyboard.

Presented by

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CIS 110 Assign 2

    • 551 Words
    • 1 Page

    relieve them for a bit by switching to autopilot. People who fly planes also can get alerts for bad…

    • 551 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    This paper will discuss input controls and their various functions. An input control includes the necessary measures to ensure that data is correct, complete, and secure (Shelly & Rosenblatt, 2012). Input controls as it relate to user interface, includes audit trails, password security, data security, and encryption (Shelly & Rosenblatt, 2012). It is vital a company should take all needed measures to protect its data, which include customer, employees, and suppliers. Most assets have a value, but corporate data is priceless, because without safe, secure, accurate data, a company cannot function. (Shelly & Rosenblatt, 2012).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    AtekPC

    • 286 Words
    • 2 Pages

    In 2007, a major news magazine ran a cover article entitled "Whither the PC?" The threats reported in their analysis were worldwide and stemmed from a variety of factors including the growing popularity of 1110bile phones, PDAs, and Web-based application software. For most people, e-mail is the 1110St important application that they use. For a long period of time, sending and receiving e-mail necessitated having a full-ncdged Pc. Nowadays, though, businesspcople and consumcrs want to reap the benefit of being able to access e-mail from anywhere, 24-7.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Typing Game

    • 1247 Words
    • 5 Pages

    Computer games offer pleasures for the player to experience and learn the objective of the game. The proponents plan to combine game and keyboard tutorial because it adds eagerness to a player to finish the game. Today, there are typing tutorial game that also pressure the player to do their best to obtain the skill needed to master keyboarding but our game has story that entertain the user for every chapter and stages of our game. The users of our software acquiring the story while learning keyboarding.…

    • 1247 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    “Securing a computer system has traditionally been a battle of wits: the penetrator tries to find…

    • 3842 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 2061 Words
    • 9 Pages

    Particular role in this process has been played by appearance of personal computer (PC), which has made computers, software and other informational technologies available to general public. Wide distribution of PC and impossibility of conducting effective control of their use have resulted in the decreasing security level of information systems.…

    • 2061 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    A tiny computer chip, called the keyboard controller or keyboard bios, that a key has been pressed. The keyboard controller places a code into a part of its memory, called the keyboard buffer, indicating which key was pressed. This code is called the key’s scan code. The keyboard controller then signals the computer’s system software that something has happened at the keyboard. It does not specify what has occurred, just that something has. The signal the keyboard sends to the computer is a special kind of message called an interrupt request using an IRQ address. The keyboard controller sends an interrupt request to the system software when it receives a complete keystroke. For example, if you type the letter "r", the controller immediately issues an interrupt request. (If you hold down the Shift Key before typing "R", the controllers wait until the whole key combination has been entered.)…

    • 800 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Keypad

    • 3427 Words
    • 14 Pages

    • • • • • • • • 16 Key Pushbutton Pad in 4 x 4 Matrix Very Low Power Consumption AVR in Sleep Mode and Wakes Up on Keypress Minimum External Components ESD Protection Included if Necessary Efficient Code Complete Program Included for AT90S1200 Suitable for Any AVR MCU…

    • 3427 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Module1 Os.Pdf

    • 3917 Words
    • 16 Pages

    often in the form of a key board, or a mouse or even a joy stick (if the application is a…

    • 3917 Words
    • 16 Pages
    Good Essays
  • Satisfactory Essays

    Micr

    • 587 Words
    • 3 Pages

    In real world , security is a major concern in our day-today life. Everyone wants to be as much secure as possible. An access control for doors forms a vital link in a security chain. The microcontroller based digital lock for doors is an access control system that allows only authorized persons to access a restricted area. The system is fully controlled by the 8 bit microcontroller AT89C2051 which has a 2Kbytes of ROM for the program memory. The password is stored in the EPROM so that we can change it at any time. The system has a Keypad by which the password can be entered through it. When the entered password equals with the password stored in the memory then the relay gets on and so that the door is opened. If we entered a wrong password for more than three times then the Alarm is switched on.…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Omr Seminar Paper

    • 4044 Words
    • 17 Pages

    There are two components to any keying system. The first component is human. This is the component that does most of the work. The second component is the keying hardware. In the early days, data was keyed on to…

    • 4044 Words
    • 17 Pages
    Better Essays
  • Good Essays

    Hacking

    • 1006 Words
    • 5 Pages

    Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.…

    • 1006 Words
    • 5 Pages
    Good Essays