Activity Monitoring Tool for Windows using Keystroke Logging
- Resource Type
- Conference
- Authors
- Sajja, Sai Teja; Asam, Vivek Vardhan; Jabbar, M. A.
- Source
- 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon) North Karnataka Subsection Flagship International Conference (NKCon), 2022 IEEE. :1-7 Nov, 2022
- Subject
- Aerospace
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Geoscience
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Buildings
Organizations
Real-time systems
Windows
Information and communication technology
Security
Computer crime
Cybersecurity
Information Security
Detection
Tracking
Monitoring
Keylogger
Keystroke
Screenshots
Microphone
Network Information
System Information
Email
- Language
In recent years information and communication technologies has become an important part of human life. Most of the organizations facing challenges in maintaining the information secured within an organization because most of the information leakage is happening due to the employees in organizations. We thought of building a tool which can monitors the employee's activities without manually monitoring the employees. This paper mainly focuses to propose a real time key logger for monitoring the activities of employees within an organization. The real time key logger such as Activity Monitoring tool monitors the employee activities based on the Key logs, Screenshots, Microphone, System and Network inputs information. Tracked employee's activities information is stored in the employee system in the form of log files based on type of the log files these files sent to admin over email. So that Employee's activities can be monitored easily by looking over those files and admin can take the certain actions based on the organization terms and conditions to maintain security within organization effectively.