Preview

Keyboard Hacking

Satisfactory Essays
Open Document
Open Document
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Keyboard Hacking
PROTECTION AGAINST HARDWARE
KEYBOARD HACKING DEVICES USING MICROPROCESSORS
ABSTRACT
Network security is a never ending battle between the system design engineers and the computer hackers. In an effort to keep the hackers out, engineers have developed an impressive array of encryption algorithms, authentication protocols and intrusion detection systems. The hackers have developed an equally impressive way of bypassing the security walls. However, both groups have continued to overlook one of the most vulnerable links in any computer network: the clients’ keyboard. Keyboards are still the input device of choice for the computers. A lot of “sensitive” information like the usernames, passwords, credit card information, etc., is passed through it. All keyboards perform the basic function of decoding the keystrokes to appropriate binary code that is read by the CPU. A small, easily purchased capture device can be attached to the computer keyboard port and can remain there for weeks, which can store decoded keystrokes directly from the keyboard and could reveal the sensitive information to the hacker. Thus the potential danger of having our network passwords and other important data stolen is always lurking around. So far, there hasn’t been a single wired keyboard that provides a solution to this problem. Probably, because this threat has been overlooked. The system of encrypting the data before transferring it through the port and later decrypting it solves this threat. So in this paper as a part we will look in detail about the keyboard capture devices & its threats to security. In the remaining half comes our ideas of securing the keyboard. If this is a success, then probably we could produce the first fully secured wired keyboard.

Presented by

You May Also Find These Documents Helpful

  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    This paper will discuss input controls and their various functions. An input control includes the necessary measures to ensure that data is correct, complete, and secure (Shelly & Rosenblatt, 2012). Input controls as it relate to user interface, includes audit trails, password security, data security, and encryption (Shelly & Rosenblatt, 2012). It is vital a company should take all needed measures to protect its data, which include customer, employees, and suppliers. Most assets have a value, but corporate data is priceless, because without safe, secure, accurate data, a company cannot function. (Shelly & Rosenblatt, 2012).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Typing Game

    • 1247 Words
    • 5 Pages

    Computer games offer pleasures for the player to experience and learn the objective of the game. The proponents plan to combine game and keyboard tutorial because it adds eagerness to a player to finish the game. Today, there are typing tutorial game that also pressure the player to do their best to obtain the skill needed to master keyboarding but our game has story that entertain the user for every chapter and stages of our game. The users of our software acquiring the story while learning keyboarding.…

    • 1247 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    “Securing a computer system has traditionally been a battle of wits: the penetrator tries to find…

    • 3842 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    The Qwerty Keyboard

    • 548 Words
    • 3 Pages

    Ever ask yourself how the keyboard came to be? It’s amazing how from a pencil we went to a press of a key. These keys made their first appearance on a typewriter by 1868. By 1872, we were presented to a great innovation called the QWERTY keyboard. The QWERTY keyboard was an innovation in history because it helped people who had poor handwriting, it speed up typing rather than slowing it down, and this machine had lower and upper case letters.…

    • 548 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Omr Seminar Paper

    • 4044 Words
    • 17 Pages

    There are two components to any keying system. The first component is human. This is the component that does most of the work. The second component is the keying hardware. In the early days, data was keyed on to…

    • 4044 Words
    • 17 Pages
    Better Essays
  • Good Essays

    A tiny computer chip, called the keyboard controller or keyboard bios, that a key has been pressed. The keyboard controller places a code into a part of its memory, called the keyboard buffer, indicating which key was pressed. This code is called the key’s scan code. The keyboard controller then signals the computer’s system software that something has happened at the keyboard. It does not specify what has occurred, just that something has. The signal the keyboard sends to the computer is a special kind of message called an interrupt request using an IRQ address. The keyboard controller sends an interrupt request to the system software when it receives a complete keystroke. For example, if you type the letter "r", the controller immediately issues an interrupt request. (If you hold down the Shift Key before typing "R", the controllers wait until the whole key combination has been entered.)…

    • 800 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Module1 Os.Pdf

    • 3917 Words
    • 16 Pages

    often in the form of a key board, or a mouse or even a joy stick (if the application is a…

    • 3917 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    Keypad

    • 3427 Words
    • 14 Pages

    • • • • • • • • 16 Key Pushbutton Pad in 4 x 4 Matrix Very Low Power Consumption AVR in Sleep Mode and Wakes Up on Keypress Minimum External Components ESD Protection Included if Necessary Efficient Code Complete Program Included for AT90S1200 Suitable for Any AVR MCU…

    • 3427 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Hacking

    • 1006 Words
    • 5 Pages

    Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Micr

    • 587 Words
    • 3 Pages

    In real world , security is a major concern in our day-today life. Everyone wants to be as much secure as possible. An access control for doors forms a vital link in a security chain. The microcontroller based digital lock for doors is an access control system that allows only authorized persons to access a restricted area. The system is fully controlled by the 8 bit microcontroller AT89C2051 which has a 2Kbytes of ROM for the program memory. The password is stored in the EPROM so that we can change it at any time. The system has a Keypad by which the password can be entered through it. When the entered password equals with the password stored in the memory then the relay gets on and so that the door is opened. If we entered a wrong password for more than three times then the Alarm is switched on.…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    network cryptography

    • 4974 Words
    • 20 Pages

    protocol operations, data structures and resources required for autokey, as well as a preliminary vulnerability assessment.…

    • 4974 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 2061 Words
    • 9 Pages

    Particular role in this process has been played by appearance of personal computer (PC), which has made computers, software and other informational technologies available to general public. Wide distribution of PC and impossibility of conducting effective control of their use have resulted in the decreasing security level of information systems.…

    • 2061 Words
    • 9 Pages
    Powerful Essays