Cybersurveillance of employees

26
Done by : B. LORENZO School year : 2013/2014 Taught by : KOBAITI

Transcript of Cybersurveillance of employees

Page 1: Cybersurveillance of employees

Done by : B. LORENZO

School year: 2013/2014 Taught by: KOBAITI

Page 2: Cybersurveillance of employees

INTRODUCTION

TRACES IN A COMPUTER SYSTEM

ON YOUR MACHINE

• Workflow tools

• The cache memory

• Cookies

• Mail

• Technical tools network monitoring

• Remote maintenance softwares

ON THE CORPORATE NETWORK

• The firewall between the company and Internet

• The proxy

AN EXAMPLE OF SOFTWARE SUPERVISORY :SUPERSCOUT

INSTALLING THE SOFTWARE

OPERATION OF SUPERSCOUT

SOME SCREENSHOTS

CONCLUSION

Page 3: Cybersurveillance of employees

Monitoring of employees is not a recent phenomenon. This

phenomenon has existed since the advent of telephone and

video security system. New technologies (IT tools, email,

internet, etc.) have amplified the problem because employees

use these tools to communicate with the outside world for

personal purposes.

In its concern to preserve information, the company feels forced

to observe and control its computer network. This is what will

inevitably lead to the cybersurveillance of employees.

We will see in the following lines how companies conduct?

Page 4: Cybersurveillance of employees

Why tracing computer data?

For the company, the plotting is a way to store all tasks

performed or decisions made by a person. It thus points to a

quality approach in running the business.

Traces in the computer world, can be found as well on your

machine where you work as some machines on the local

network of your company.

Page 5: Cybersurveillance of employees
Page 6: Cybersurveillance of employees

It is the software that allows the company to manage its

operations . Depending on the case, you must meet certain account

cards made that reflect your business and the actions that you

lead.

• Workflow tools

Page 7: Cybersurveillance of employees

It allows the origin to optimize download time certain Web

pages. But they obviously contain the nature of the sites visited.

These files are in the folder "Temporary Internet File" in

Windows or "cache" Linux.

Page 8: Cybersurveillance of employees

Cookies are files "text" that are used by HTTP servers and

facilitate your navigation through the site. They can, for

example, store numbers entered on some pages, store the time

you spend on their site (for you automatically disconnect the

site if you have no activity) or much other information.

Page 9: Cybersurveillance of employees

The messages you receive and send are stored locally on your

machine. You can delete your folders and remove them from

your basket. Your employer can make a copy of all emails sent

and received from the "mail server". Some softwares also allow

the manipulation.

Page 10: Cybersurveillance of employees

These are softwares or hardwares used by network

administrators in order to collect information on key points in

the network. These tools allow to know the network status at all

times and act accordingly.

Example of softwares: LanSpy, CyberPatrol, WinWhatWhere.

• Technical tools network monitoring

Page 11: Cybersurveillance of employees

These are softwares that allow computer users to

troubleshoot remotely. Their effectiveness is increased

because they no longer need to travel to troubleshoot users.

They take hold of your computer through a remote

maintenance software. They recover the view from your

computer.

Page 12: Cybersurveillance of employees
Page 13: Cybersurveillance of employees

It is software or hardware that helps protect the company 's

external attacks . Any access to a server through the " firewall " that

makes the connection between the external and internal machines to

the company.

Page 14: Cybersurveillance of employees

The proxy server is used to store all visited Web pages by the user :

it is a kind of cache Web pages. In case of connections to a web page ,

the proxy server is consulted to determine if it has not already stored

this page. In this case , it returns the requested page , otherwise it

downloads the web and places it in its cache.

Page 15: Cybersurveillance of employees

SuperScout is a software developed by SurfControl. It

consists of software responsible for scrupter mails

(SurfControl Email Filter), and another to monitor all

websites visited by employees (SurfControl Web Filter). This

software clearly allows to spy on users

Page 16: Cybersurveillance of employees

The software installation is relatively simple. Just know

where the servers on the network (firewall and proxy) to

produce a correct installation. Must still take into account

that the software is resource intensive: the software

requires approximately 100MB launched RAM.

Page 17: Cybersurveillance of employees

The main features of the software are:

• Filtering messages based on key words in a dictionary

• Dictionary divided into 15 sections, ability to customize

the dictionary, updated online dictionary

• Possibility to filter by type of attachments, attachments

by name, according to its content, sender etc.

• Storing the results in a database, available in real time or

later.

• Generation of statistics on the results

Page 18: Cybersurveillance of employees
Page 19: Cybersurveillance of employees

Page 20: Cybersurveillance of employees
Page 21: Cybersurveillance of employees
Page 22: Cybersurveillance of employees

Page 23: Cybersurveillance of employees
Page 24: Cybersurveillance of employees
Page 25: Cybersurveillance of employees

In the future, would you agree to be spied or

monitored by your employer?

Page 26: Cybersurveillance of employees