78.4k views
0 votes
An unauthorized user observing system security procedures is known as:

A. A worm.
B. Shoulder surfing.
C. Phishing.
D. Spyware.

User DanArl
by
8.4k points

1 Answer

5 votes

Final answer:

Shoulder surfing refers to the method where an unauthorized user gains information by directly observing another user's entry of sensitive data. It is one of the many tactics used by hackers, but it relies on physical observation as opposed to digital methods like spyware or phishing.

Step-by-step explanation:

An unauthorized user observing system security procedures is known as B. Shoulder surfing. This term refers to the practice of peeking over someone's shoulder to gain information while they are entering sensitive data, such as passwords or ATM PIN numbers. While hackers use a multitude of strategies to infiltrate systems and deceive individuals, shoulder surfing is a direct and simple way of stealing credentials without the need for sophisticated technology.

Hackers often rely on various creative methods such as the use of spyware—malicious software designed to gather data from a user without their knowledge—or phishing, which involves tricking people into clicking on fraudulent links or giving out their personal information. Unlike worms or spyware, shoulder surfing is based on direct observation rather than software infiltration. Awareness and preventive measures, like shielding the keypad or credentials when entering them, can reduce the risk of shoulder surfing.

User Shoreline
by
7.8k points