What is the term for the unauthorized interception and use of passwords?

Sample the CISSP Domain 5 Identity and Access Management Test. Study with flashcards and multiple choice questions for exam readiness. Enhance your knowledge and skills!

The term for the unauthorized interception and use of passwords is best described as keylogging. Keylogging refers to the practice of capturing keystrokes made on a keyboard, which can then be used to obtain sensitive information such as passwords. This method allows attackers to capture login credentials without the user realizing it, making it a serious security threat.

In contrast, phishing involves tricking individuals into providing sensitive information through deceptive communications, typically via email or fake websites. Credential stuffing refers to a method where attackers use stolen username and password pairs from one breach to access multiple accounts, relying on the common practice of password reuse. Session hijacking is an attack where an attacker takes over a user session after it has been established, potentially gaining access to resources without needing the user's credentials.

Keylogging specifically pertains to the capture of keystrokes, placing it directly in line with the unauthorized interception and use of passwords.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy