
User Activity Monitoring System / SPYWARE
Author(s) -
Ms. Sakshi Sanklecha,
Mr. Darshit Deotale,
Ms. Jyoti Yadav,
Ms. Dipti Mishra,
Prof V. P. Yadav
Publication year - 2022
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2022.40854
Subject(s) - computer science , debugging , session (web analytics) , event (particle physics) , task (project management) , scope (computer science) , world wide web , human–computer interaction , engineering , operating system , physics , systems engineering , quantum mechanics , programming language
User activity monitoring (UAM) do the task of monitoring and recording of user actions, in the field of information security or cyber security. Including the use of applications, windows opened, system commands executed, checkboxes clicked, text entered/edited, URLs visited and nearly every everything on-screen event to protect data by ensuring that employees and contractors are performing their assigned tasks and not posing any risk to the organization are all captured and recorded in the system by the UAMS. Video-like playback of user activity and process the videos into user activity logs that keep step-by-step records of user actions that can be searched and analysed is delivered by the User Activity Monitoring System to investigate any out-of-scope activities. Creating a visual record of potentially hazardous user activity are all involved in Visual Forensics. Each user action is logged, and recorded. Once a user session is completed, UAM creates a written record as well as visual record. It can be screen- captures/screenshots or video of exactly what kind of activity a user has done. This written record of our UAMS differs from that of a SIEM or logging tool, because it captures data at a user-level not at a system level –providing plain English logs rather than System Logs (which is originally created for debugging purposes). These textual logs can be used to pair with the corresponding screen- captures/screenshots or video summaries. Using these corresponding logs and images, the visual forensics component of UAM allows for organizations to search for exact user activity in case of a security incident. In the case of a security threat, i.e. a data breach or data leak, visual Forensics are used to show exactly what kind of activity a user has done, and everything leading to the incident. Visual Forensics can also be used to provide evidence to any law enforcement that investigate the intrusion or leak.