Shoulder surfing is a social engineering method where an attacker physically observes someone’s screen or keyboard to steal sensitive information, like passwords or PINs, without their knowledge. This technique relies on being close to the target, often in public spaces, to view confidential details.
Incorrect Answers: Keylogging involves tracking keystrokes through software or hardware to capture information, unlike shoulder surfing, which requires direct observation. Installing malware to remotely control another person’s device is a form of cyberattack that doesn’t need the attacker to be physically near the victim. Phishing uses deceptive emails or messages to trick users into providing sensitive information and does not involve observing the user in person.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a shoulder surfer?
Open an interactive chat with Bash
What other methods can I use to protect my screen in public?