There's also the issue of over-the-shoulder viewing. I doubt my cubical-mate could follow my typing on a keyboard...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
lying horizontal on my desk, but he or she could easily see which keys I press on my screen as I enter my password (unless of course an overlay has been placed on my monitor to deter this).
Finally, since virtual keyboards aren't standard in any Web applications I've seen, there's the cost of development and support for the creation of the keyboard and its integration into the Web applications.
On the plus side, and a big plus at that, keyloggers wouldn't be able to capture this information, since you would be using either a mouse or a touch screen to enter the information, thus keeping passwords secure.
However, as a security professional, before I decided to use a virtual keyboard on my site, I'd have to weigh the risks. Who are the constituents who will be accessing the site and how technologically savvy are they? What platforms will they be using? What is the risk that the systems accessing the site will have keylogger or other capture software on them? What is the value of, or what are the privacy concerns regarding the content the site provides? Does this affect the end user's ease of accessing the site? After analyzing the results, I'd then decide whether the functionality justifies the risks of adding a virtual keyboard to my site.
Dig Deeper on Password Management and Policy
Related Q&A from Randall Gamby
Enterprise SSO products have matured over the years, so what's the state of eSSO today? Expert Randall Gamby discusses.continue reading
Enterprises need a full understanding of the FIDO authentication framework before switching to its technology. Expert Randall Gamby looks at the most...continue reading
A self-managed HSM appliance may be the safer external key management system to use with your organization's encryption keys. Here's why.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.