Which of the following is violated in a shoulder surfing attack?

Shoulder surfing is a type of in-person attack in which the attacker gathers information
about the premises of an organization. This attack is often performed by looking
surreptitiously at the keyboard of an employee’s computer while he is typing in his password
at any access point such as a terminal/Web site. Which of the following is violated in a
shoulder surfing attack?

Shoulder surfing is a type of in-person attack in which the attacker gathers information
about the premises of an organization. This attack is often performed by looking
surreptitiously at the keyboard of an employee’s computer while he is typing in his password
at any access point such as a terminal/Web site. Which of the following is violated in a
shoulder surfing attack?

A.
Authenticity

B.
Confidentiality

C.
Availability

D.
Integrity



Leave a Reply 0

Your email address will not be published. Required fields are marked *