Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 2, Problem 7RQ
Program Plan Intro

Shoulder surfing:

It is a technique in which attacker gets the personal or confidential information of the victim by looking over the victim’s shoulder. This can be performed in close range and in longer range. Earlier binoculars or some similar hardware were used in longer range shoulder surfing. Now, as there is advancement in technology like hidden cameras or secret microphones make shoulder surfing easier.

Blurred answer
Students have asked these similar questions
What laptop device prevents shoulder surfing?
Shoulder surfing may be prevented with what laptop device?
What technology may be used to prevent shoulder surfing on a laptop?
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage