cybersurveillance of employees
TRANSCRIPT
![Page 1: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/1.jpg)
Done by : B. LORENZO
School year: 2013/2014 Taught by: KOBAITI
![Page 2: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/2.jpg)
INTRODUCTION
TRACES IN A COMPUTER SYSTEM
ON YOUR MACHINE
• Workflow tools
• The cache memory
• Cookies
• Technical tools network monitoring
• Remote maintenance softwares
ON THE CORPORATE NETWORK
• The firewall between the company and Internet
• The proxy
AN EXAMPLE OF SOFTWARE SUPERVISORY :SUPERSCOUT
INSTALLING THE SOFTWARE
OPERATION OF SUPERSCOUT
SOME SCREENSHOTS
CONCLUSION
![Page 3: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/3.jpg)
Monitoring of employees is not a recent phenomenon. This
phenomenon has existed since the advent of telephone and
video security system. New technologies (IT tools, email,
internet, etc.) have amplified the problem because employees
use these tools to communicate with the outside world for
personal purposes.
In its concern to preserve information, the company feels forced
to observe and control its computer network. This is what will
inevitably lead to the cybersurveillance of employees.
We will see in the following lines how companies conduct?
![Page 4: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/4.jpg)
Why tracing computer data?
For the company, the plotting is a way to store all tasks
performed or decisions made by a person. It thus points to a
quality approach in running the business.
Traces in the computer world, can be found as well on your
machine where you work as some machines on the local
network of your company.
![Page 5: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/5.jpg)
![Page 6: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/6.jpg)
It is the software that allows the company to manage its
operations . Depending on the case, you must meet certain account
cards made that reflect your business and the actions that you
lead.
• Workflow tools
![Page 7: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/7.jpg)
It allows the origin to optimize download time certain Web
pages. But they obviously contain the nature of the sites visited.
These files are in the folder "Temporary Internet File" in
Windows or "cache" Linux.
•
![Page 8: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/8.jpg)
•
Cookies are files "text" that are used by HTTP servers and
facilitate your navigation through the site. They can, for
example, store numbers entered on some pages, store the time
you spend on their site (for you automatically disconnect the
site if you have no activity) or much other information.
![Page 9: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/9.jpg)
•
The messages you receive and send are stored locally on your
machine. You can delete your folders and remove them from
your basket. Your employer can make a copy of all emails sent
and received from the "mail server". Some softwares also allow
the manipulation.
![Page 10: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/10.jpg)
These are softwares or hardwares used by network
administrators in order to collect information on key points in
the network. These tools allow to know the network status at all
times and act accordingly.
Example of softwares: LanSpy, CyberPatrol, WinWhatWhere.
• Technical tools network monitoring
![Page 11: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/11.jpg)
•
These are softwares that allow computer users to
troubleshoot remotely. Their effectiveness is increased
because they no longer need to travel to troubleshoot users.
They take hold of your computer through a remote
maintenance software. They recover the view from your
computer.
![Page 12: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/12.jpg)
![Page 13: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/13.jpg)
It is software or hardware that helps protect the company 's
external attacks . Any access to a server through the " firewall " that
makes the connection between the external and internal machines to
the company.
•
![Page 14: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/14.jpg)
The proxy server is used to store all visited Web pages by the user :
it is a kind of cache Web pages. In case of connections to a web page ,
the proxy server is consulted to determine if it has not already stored
this page. In this case , it returns the requested page , otherwise it
downloads the web and places it in its cache.
•
![Page 15: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/15.jpg)
SuperScout is a software developed by SurfControl. It
consists of software responsible for scrupter mails
(SurfControl Email Filter), and another to monitor all
websites visited by employees (SurfControl Web Filter). This
software clearly allows to spy on users
![Page 16: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/16.jpg)
The software installation is relatively simple. Just know
where the servers on the network (firewall and proxy) to
produce a correct installation. Must still take into account
that the software is resource intensive: the software
requires approximately 100MB launched RAM.
![Page 17: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/17.jpg)
The main features of the software are:
• Filtering messages based on key words in a dictionary
• Dictionary divided into 15 sections, ability to customize
the dictionary, updated online dictionary
• Possibility to filter by type of attachments, attachments
by name, according to its content, sender etc.
• Storing the results in a database, available in real time or
later.
• Generation of statistics on the results
![Page 18: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/18.jpg)
![Page 19: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/19.jpg)
•
![Page 20: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/20.jpg)
![Page 21: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/21.jpg)
![Page 22: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/22.jpg)
•
![Page 23: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/23.jpg)
![Page 24: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/24.jpg)
![Page 25: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/25.jpg)
In the future, would you agree to be spied or
monitored by your employer?
![Page 26: Cybersurveillance of employees](https://reader033.vdocuments.site/reader033/viewer/2022042817/55a80c3d1a28abcf118b46ce/html5/thumbnails/26.jpg)