Hiring Hourly Employees Student Employees Temporary & Casual Employees Work-Study Student Employees.
Cybersurveillance of employees
-
Upload
lorenzo-aiba-b -
Category
Engineering
-
view
51 -
download
0
Transcript of Cybersurveillance of employees
Done by : B. LORENZO
School year: 2013/2014 Taught by: KOBAITI
INTRODUCTION
TRACES IN A COMPUTER SYSTEM
ON YOUR MACHINE
• Workflow tools
• The cache memory
• Cookies
• Technical tools network monitoring
• Remote maintenance softwares
ON THE CORPORATE NETWORK
• The firewall between the company and Internet
• The proxy
AN EXAMPLE OF SOFTWARE SUPERVISORY :SUPERSCOUT
INSTALLING THE SOFTWARE
OPERATION OF SUPERSCOUT
SOME SCREENSHOTS
CONCLUSION
Monitoring of employees is not a recent phenomenon. This
phenomenon has existed since the advent of telephone and
video security system. New technologies (IT tools, email,
internet, etc.) have amplified the problem because employees
use these tools to communicate with the outside world for
personal purposes.
In its concern to preserve information, the company feels forced
to observe and control its computer network. This is what will
inevitably lead to the cybersurveillance of employees.
We will see in the following lines how companies conduct?
Why tracing computer data?
For the company, the plotting is a way to store all tasks
performed or decisions made by a person. It thus points to a
quality approach in running the business.
Traces in the computer world, can be found as well on your
machine where you work as some machines on the local
network of your company.
It is the software that allows the company to manage its
operations . Depending on the case, you must meet certain account
cards made that reflect your business and the actions that you
lead.
• Workflow tools
It allows the origin to optimize download time certain Web
pages. But they obviously contain the nature of the sites visited.
These files are in the folder "Temporary Internet File" in
Windows or "cache" Linux.
•
•
Cookies are files "text" that are used by HTTP servers and
facilitate your navigation through the site. They can, for
example, store numbers entered on some pages, store the time
you spend on their site (for you automatically disconnect the
site if you have no activity) or much other information.
•
The messages you receive and send are stored locally on your
machine. You can delete your folders and remove them from
your basket. Your employer can make a copy of all emails sent
and received from the "mail server". Some softwares also allow
the manipulation.
These are softwares or hardwares used by network
administrators in order to collect information on key points in
the network. These tools allow to know the network status at all
times and act accordingly.
Example of softwares: LanSpy, CyberPatrol, WinWhatWhere.
• Technical tools network monitoring
•
These are softwares that allow computer users to
troubleshoot remotely. Their effectiveness is increased
because they no longer need to travel to troubleshoot users.
They take hold of your computer through a remote
maintenance software. They recover the view from your
computer.
It is software or hardware that helps protect the company 's
external attacks . Any access to a server through the " firewall " that
makes the connection between the external and internal machines to
the company.
•
The proxy server is used to store all visited Web pages by the user :
it is a kind of cache Web pages. In case of connections to a web page ,
the proxy server is consulted to determine if it has not already stored
this page. In this case , it returns the requested page , otherwise it
downloads the web and places it in its cache.
•
SuperScout is a software developed by SurfControl. It
consists of software responsible for scrupter mails
(SurfControl Email Filter), and another to monitor all
websites visited by employees (SurfControl Web Filter). This
software clearly allows to spy on users
The software installation is relatively simple. Just know
where the servers on the network (firewall and proxy) to
produce a correct installation. Must still take into account
that the software is resource intensive: the software
requires approximately 100MB launched RAM.
The main features of the software are:
• Filtering messages based on key words in a dictionary
• Dictionary divided into 15 sections, ability to customize
the dictionary, updated online dictionary
• Possibility to filter by type of attachments, attachments
by name, according to its content, sender etc.
• Storing the results in a database, available in real time or
later.
• Generation of statistics on the results
•
•
In the future, would you agree to be spied or
monitored by your employer?