The document discusses different forms of surveillance that have increased with advances in information and communication technology. It describes surveillance as close observation that can now be done remotely and covertly using computer systems. Examples provided include video surveillance through security cameras and audio surveillance with hidden microphones. The document also discusses how surveillance is used to monitor computers for malicious software and security threats, and how technology now allows remote monitoring of individuals through their computers' electromagnetic emissions and unique keyboard sounds.
The document discusses different forms of surveillance that have increased with advances in information and communication technology. It describes surveillance as close observation that can now be done remotely and covertly using computer systems. Examples provided include video surveillance through security cameras and audio surveillance with hidden microphones. The document also discusses how surveillance is used to monitor computers for malicious software and security threats, and how technology now allows remote monitoring of individuals through their computers' electromagnetic emissions and unique keyboard sounds.
Original Description:
Basically about security measures and protocols to follow in IT systems.
The document discusses different forms of surveillance that have increased with advances in information and communication technology. It describes surveillance as close observation that can now be done remotely and covertly using computer systems. Examples provided include video surveillance through security cameras and audio surveillance with hidden microphones. The document also discusses how surveillance is used to monitor computers for malicious software and security threats, and how technology now allows remote monitoring of individuals through their computers' electromagnetic emissions and unique keyboard sounds.
The document discusses different forms of surveillance that have increased with advances in information and communication technology. It describes surveillance as close observation that can now be done remotely and covertly using computer systems. Examples provided include video surveillance through security cameras and audio surveillance with hidden microphones. The document also discusses how surveillance is used to monitor computers for malicious software and security threats, and how technology now allows remote monitoring of individuals through their computers' electromagnetic emissions and unique keyboard sounds.
OF ICT WHAT IS SURVEILLANCE? Surveillance is commonly described as keeping a close observation of a person or group With the addition of Computer aided surveillance systems, close observations are able to be achieved without drawing suspicion to oneself towards the person depending upon the situation. With the advancement in technology, the grip that surveillance has on society has increased drastically over the years.
EXAMPLES OF SURVEILLANCE Originally Surveillance was used to make people feel secure. Business could use this to their advantage as an act of motivation, the sense of security would well indeed motivated workers to increase on the yield of their work. Such examples of Surveillance are: Video Surveillance: The most common of the means of Surveillance, for example Traffic lights, Bank cameras and warehouse surveillance Audio Surveillance: Another form of surveillance with use of Audio input devices, for example Tape Recorders hidden microphones.
SURVEILLANCE AGAINST SOFTWARE MALICIOUSNESS Surveillance can also be carried out against the threat of malicious computer software's. This is done by examining data stored on a computer hard drives and in some cases monitoring the activity of the user. Certain surveillance programs are installed on a computer which can search the contents of the hard drive for suspicious data also monitoring computer usage and report back activities in real -time to the owner of the computer or its operator through the Internet connection. Such malicious software's include: Spyware Computer virus Trojan COMPUTER MONITORING With the advancement of technology, surveillance of an individual can be done through his or her laptop/desktop from a distance. This form of computer surveillance, known as TEMPEST. This is done by detecting the given off by the Cathode Ray Tube monitor. Also involving reading electromagnetic emanations from computing devices as means of extracting data from them at distances of hundreds of meters. Research has also shown that majority of computer Keyboards each emit slightly different noises when pressed. This means that observers can identify individual CPU users and monitor there progress. FINISHED Special thanks to John Onyango