“…Threats to the security of the network ABS can be divided into network attacks (information coming from the remote agent) and local attacks originating from malware already installed on the client system, such as Trojans, rootkits, and so on. Often authentication security assessment focused primarily on network attacks suggesting that the terminal (ie, desktop computer, laptop or mobile device) is protected platform [23]. However, often the attacker has full access to the victim's computer through the hidden processes of communication that remained from malware using uncorrected security holes licensed software.…”