Keystroke logging, depending on how it is implemented, can easily bypass the best host and network security, collecting valuable key information for use in later attacks or information gathering exercises. Keystroke logging through the data it captures can also remove the requirement to brute force...