Abstract
Abstract: User activity monitoring (UAM) do the task of monitoring and recording of user actions, in the field of information security or cyber security. Including the use of applications, windows opened, system commands executed, checkboxes clicked, text entered/edited, URLs visited and nearly every everything on-screen event to protect data by ensuring that employees and contractors are performing their assigned tasks and not posing any risk to the organization are all captured and recorded in the system by the UAMS. Video-like playback of user activity and process the videos into user activity logs that keep step-by-step records of user actions that can be searched and analysed is delivered by the User Activity Monitoring System to investigate any out-of-scope activities. Creating a visual record of potentially hazardous user activity are all involved in Visual Forensics. Each user action is logged, and recorded. Once a user session is completed, UAM creates a written record as well as visual record. It can be screen- captures/screenshots or video of exactly what kind of activity a user has done. This written record of our UAMS differs from that of a SIEM or logging tool, because it captures data at a user-level not at a system level –providing plain English logs rather than System Logs (which is originally created for debugging purposes). These textual logs can be used to pair with the corresponding screen- captures/screenshots or video summaries. Using these corresponding logs and images, the visual forensics component of UAM allows for organizations to search for exact user activity in case of a security incident. In the case of a security threat, i.e. a data breach or data leak, visual Forensics are used to show exactly what kind of activity a user has done, and everything leading to the incident. Visual Forensics can also be used to provide evidence to any law enforcement that investigate the intrusion or leak.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal for Research in Applied Science and Engineering Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.