How Do I Monitor Employee Internet Activity?

Internet monitoring is to monitor and control the computers in the local area network, and to manage the Internet activities on the internal computers (online monitoring) and non-internet related internal behaviors and assets (intranet monitoring). The rapid development of the Internet and the use of the Internet are becoming more and more common. The Internet has not only become an internal communication bridge for enterprises, but also an important channel for businesses to conduct various business transactions with the outside world. Internet monitoring products are mainly divided into monitoring software and monitoring hardware.

Internet monitoring is to monitor and control the computers in the local area network, and to manage the Internet activities on the internal computers (online monitoring) and non-internet related internal behaviors and assets (intranet monitoring). The rapid development of the Internet and the use of the Internet are becoming more and more common. The Internet has not only become an internal communication bridge for enterprises, but also an important channel for businesses to conduct various business transactions with the outside world. Network monitoring products are mainly divided into monitoring software and monitoring hardware.
Internet monitoring products are mainly divided into monitoring software and monitoring hardware.
Local area network monitoring should include internal network monitoring in addition to monitoring Internet access behavior; it also adds management of data security, because if you only monitor and data has been lost, the monitoring itself will lose its core meaning; so More and more transparent encryption software is used; a complete network monitoring software should include two parts: online monitoring and internal network monitoring. The completed network monitoring software already includes all the following functions;
The selection of Internet monitoring software is very strict:
1. Shaping products conforming to current national and industry standards should be used
2. All equipment in the system must be produced by a manufacturer with a production license. The equipment shall have the manufacturer's nameplate or trademark, inspection certificate and instruction manual.
3. For non-shaped supporting equipment or auxiliary equipment, it must meet the quality requirements of engineering design.
4. For domestic products and foreign products with similar prices and performance indicators, domestic products should be given priority to protect the development of national industries.
5. The performance and technical requirements of all equipment in the system should be coordinated and meet the system design requirements.
6. The system's television system should be the same as China's current radio and television system standards.
7, the system uses equipment and components of the video input and output impedance and the cable's characteristic impedance should be 75, the input and output impedance of audio equipment should be high impedance or 600.
There are dozens of products on the market that can provide full or partial online behavior management functions. If differentiated by the scope of application of the product, it is usually divided into three categories.
1, suitable for the number of PCs online is less than 50.
Such products are generally based on pure software and low-end broadband routers integrated with filtering such as QQ, MSN, and BT. Software-only products usually have low cost and poor stability, and are suitable for users who have requirements for online behavior management but have limited budgets. The low-end broadband router integrates filtering functions for some common applications or software, which also wins at a low price. While providing basic networking applications, taking into account the most basic online behavior management needs, it is easier for price-sensitive users to accept.
2, suitable for the number of PCs on the Internet at the same time between 50 ~ 200.
These products are generally based on high-performance Internet behavior management equipment and software products with independent research and development Kercap engine. That is, on a high-performance gateway router, a deep packet inspection (DPI) function is added. Through the analysis of network application signatures, in conjunction with integrated strategies such as intelligent bandwidth management and automatic behavior control, it comprehensively manages the filtering of illegal websites such as chat, online videos, stocks, games, P2P downloads, violence, and pornography. LAN side user traffic statistics, concurrent session statistics and other functions provide comprehensive management methods. Usually the price is slightly higher than software products or low-end routers, but with more comprehensive functions, more stable performance, and cost-effectiveness can be accepted by enterprise users of this size.
3, suitable for more than 200 PCs to manage the Internet at the same time.
This type of product is usually a combination of hardware and software. That is, the same software version is installed on industrial computers of different grades. After repeated tests, depending on the processing performance of the installed industrial computer, it can cover 200 ~ 500, 500 ~ 1000, and even a larger range of concurrent applications. . As a more powerful industrial computer is used as a processing platform, these products can provide more functions. Some products can even cache content browsed or sent online, and retrieve information that may involve leaking company secrets, breaking the law, or unsuitable for working hours. What to deal with, and then adopt corresponding strategies to limit.
For larger companies, IT management relies more on technology, and the content and methods of management need to be more extensive to meet the needs of large-scale management. Such products require high-performance industrial computers to support them because of their complex functions, so the initial price is usually due to the cost of hardware, and only small and medium-sized enterprises with a certain scale and demand can accept it.
There are also some of these manufacturers that have launched products suitable for small and medium-sized users. There is not much difference in functionality, but they choose a more inexpensive industrial computer for processing, which reduces the overall cost and scope of application to meet the needs of small and medium-sized users. The price has accordingly dropped below 10,000 yuan.
The following example introduces a monitoring system.
The modernization of Internet monitoring laws, including the modernization of legal concepts, legal systems, legal content, and legislative techniques, analysis based on internationally accepted norms shows that the modernization of network monitoring laws is based on the idea of prioritizing security interests. Specifically, it should include: updating the legal concept from an absolute privacy perspective to a security-first relative privacy perspective; upgrading the legal system from a traditional decentralized, variable-efficiency, and poorly operable set of regulations to high-efficiency-level specialized legislation ; The legal content from the traditional focus on limiting the length of network monitoring power, the development of rich to protect and limit the equally important proportion. Social contract theory, network epistemology, technological development, dynamic adjustment of social privacy concept, development needs of the communications industry, and the promotion and innovation of network monitoring laws. Its modernization process has always been an important legal development area for freedom and security in countries around the world.
The development trend of the relevant legal system in the world indicates that the network monitoring law is in the modern transformation stage. The paradigm shift is intended to regulate communication monitoring through special laws instead of administrative means; judicial reform is the principle of the supervision and authorization mechanism innovation, supplemented by Extensive authorization mechanism for heads of law enforcement agencies; pass legislation to specify clear and specific obligations for law enforcement to assist law enforcement and share equally the cost of law enforcement assistance.
1. Ensuring the legitimacy of "security-first" cyber surveillance laws through the rule of law In the face of evolving terrorism and high-tech crimes, most countries have or are currently formulating high-level, specialized and effective laws to ensure compliance with the constitution and legal framework Strengthening and regulating the national network monitoring power within the government is the rule of law for network monitoring power. Network surveillance is no longer a secret plan, but a law-based and open state public power act. Its means is to construct a constitutionally efficient network surveillance mechanism to prevent and combat serious crimes such as extremism and terrorism. Maintain public safety and national security. The composition of the network monitoring right mainly includes two aspects: the interception of communication content; the retention of communication data.
2. Flexible and efficient supervision mechanism: give priority to safeguarding security interests while taking into account privacy protection. The flexibility and efficiency of network monitoring power supervision is reflected in the reform of the supervision and authorization mechanism: the protection mechanism that distinguishes communication content and communication data, and improves the efficiency of law enforcement by security agencies. And protect citizen privacy appropriately. Informatization and networking have brought about an epoch-making paradigm revolution. The scope of privacy has diverged with the development of network technologies and services, and the legal paradigm for protecting privacy has also evolved. The elements of privacy are clearly classified in cyberspace, and both the public and public authorities recognize that privacy can be clearly divided into two parts: communication content and communication data. Communication content has the highest privacy sensitivity level, and communication data has a relatively low sensitivity level because it does not involve content. Regarding the retention and retrieval of communication data, the emerging data retention laws provide for a more flexible and efficient authorization and supervision mechanism. Because it does not involve the most sensitive communication content, the authorization and supervision mechanism of communication data monitoring is based on the priority of safety and efficiency, which is relatively loose and flexible. Its basic model is: law enforcement agencies approve and use communication data on their own, and relevant supervision agencies conduct post-event supervision audit.
3. Assist in the clarification and compulsory enforcement of law: constructing the rules for realizing network monitoring rights and effectively protecting the security interests. The modernization of network monitoring legislation is also the transition from traditional state secret monitoring to communication service providers to assist in monitoring. Due to the rapid development of network technologies and services, law enforcement agencies have difficulty relying on their own power to independently implement network monitoring. Communications operators are required to assist law enforcement.
4. Assist in the fairness of law enforcement cost sharing: ensure security while taking into account the development of the industry. It is clear that the government's compensation responsibilities to the telecommunications industry are shared equally, and the cost of assisting law enforcement is equally shared with industry development. This is one of the manifestations of the modernization of the network monitoring law. The ability to ensure the interception of communication content and the retention of communication data will undoubtedly require huge costs. Especially the data retention system, which is the main symbol of the modernization of network monitoring legislation, its implementation will generate a large number of technical updates and data storage requirements, requiring network service providers to invest huge sums of money to equip corresponding human and technical facilities. The sharing of data retention costs is a content that must be clarified by relevant regulations. As communication service providers assist in data retention, it is a kind of assistance to public power and is not a necessary component of the communication business. Therefore, regulations on compensation for its costs vary from country to country [1] .

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?