Monitoring Your Users


Click here to start

Table of contents

Monitoring Your Users

Disclaimer

Fred Cohen

Monitoring Experience

Outline

Legal Issues

Wiretapping laws / criminal acts

Worker Agreements

Civil Actions

Technical Issues

Types of monitoring

Sensor placement

Classic Technologies

Video Viewing for Keys

Monitor the Keyboard

van-Eck Observation

Monitoring the user system

Application Monitoring

Server monitoring

Telephone Monitoring

Firewall monitoring

Firewall monitoring

Network monitoring

Audit and content-based monitoring

Exfiltration methods

Defeating the monitoring

Analysis

Case examples

Federal Facilities

Major Corporations

More case examples

Summary

Author: Fred Cohen

E-mail: fc@all.net

Best viewed with
StarOffice