Table of contentsMonitoring Your Users
Disclaimer
Fred Cohen
Monitoring Experience
Outline
Legal Issues
Wiretapping laws / criminal acts
Worker Agreements
Civil Actions
Technical Issues
Types of monitoring
Sensor placement
Classic Technologies
Video Viewing for Keys
Monitor the Keyboard
van-Eck Observation
Monitoring the user system
Application Monitoring
Server monitoring
Telephone Monitoring
Firewall monitoring
Firewall monitoring
Network monitoring
Audit and content-based monitoring
Exfiltration methods
Defeating the monitoring
Analysis
Case examples
Federal Facilities
Major Corporations
More case examples
Summary
|
Author: Fred Cohen
E-mail: fc@all.net
Best viewed with
|