Saturday, 2 April 2022

What is Shoulder Surfing in Cyber Security?

Cyber Security, EC-Council Certification, EC-Council Career, EC-Council Jobs, EC-Council Skills, EC-Council Preparation

In a real IoT digital world, we are more about our personal information is stored in smartphones nowadays, there is an urgent basis need to protecting them from unauthorized access from other people. The first serve line of duty defense of a smartphone is its screen locking, Thus, many screening locking functions have been designated with the an predefined objective of minimizing, if not eliminating the more maximum chances of unauthorised access through from attacks such as shoulder surfing.

This article provides an overview of the state review of research of on non-biometric shoulder surfing moves screen locking methods with the objective to identify the techniques used by these methods in defending reports against shoulder surf attacks on us.

How does a Shoulder Surfing Attack Works?

A shoulder surfing attack explaining a situation as when the attacker can physically view the devices screens and the password typing keypad to obtain personal information i.e. one of the group of attack methods required the hacker attacker to be physically closed to the victims to its succeed for its goal and thus the few shoulder surfing attacks will occurs with intruder virus malicious intentions or virus malware accessing to it, some similar might result from nosy to people, where it is more an invasion for our privacy.

Therefore it might be simply looking over the victimers shoulder surfings as the name suggestion, analyzing some hacking base attackers will use binoculars, miniature video secrete cameras, or other optical technology based devices for to spy on their victims. The aim is to getting information such as usernames/IDs, passwords, personally beneficial or sensitive information, and credit card numbers for profitable from it using Shoulder Surfing in Cyber Security.

Example:

◉ if we are using an ATM Card, someone positioned themselves in such a way that they are enabled them to watch it when you enter your PIN. In a rush, you leaving the ATM with your card and money without making sure to it had exited entirely out of your accounts. If the ATM doesn’t required the card to be inserted for the all-over full transaction, other transactions are secured if you don’t confirming that you have any other transaction to make as own long as the attacker knows your ATM PINs.

◉ This victim accidentally leaves their devices in public places and watches the victims as he enters their passwords encryption into their computers pc just moments before, the attacker can unlock the device or view it with this information, putting any sensitive frequent data on the computer at its own risk.

◉ When there is Crowded public in transmitting making the work it easy for attackers to see the devices screens of others or hear conversations of others. In these phase, they’re literally looking for attack over the victim’s shoulder.

How to Prevent Shoulder Surfing Attacks:

The following are simple ways to protecting yourself from shoulder surfing in daily lifetime basis when entering or accessing personals secret data on an virtually protected devices in daily life basis:

◉ Looking for an area of space free where your back is against a wall.

◉ Never giving or sharing your password or any vital information to anyone.

◉ Spending more for a screen filter or protector to obscure the visibility of the displays.

◉ never shared such open personal accounts in public local places.

◉ Locating a quiet spot away from the crowd.

◉ Password-less authentications can eliminating the usability of passwords.

◉ Adding two-factor authentication on your devices.

◉ When entering data on a mobile phone in a public places, please sit with your back at the wall to protect yourself from any attack.

◉ Locking your own mobile or any devices whenever you leave them.

Source: geeksforgeeks.org

Related Posts

0 comments:

Post a Comment