Publishing house Radiotekhnika

"Publishing house Radiotekhnika":
scientific and technical literature.
Books and journals of publishing houses: IPRZHR, RS-PRESS, SCIENCE-PRESS

Тел.: +7 (495) 625-9241


System for monitoring network activity of personnel based on a proxy server


S.V. Lokhin – Undergraduate, Nizhny Novgorod State Technical University n.a. R.E. Alekseev
A.V. Semashko – Ph. D. (Eng.), Associate Professor, Nizhny Novgorod State Technical University n.a. R.E. Alekseev
A.I. Egorova – Post-graduate Student, Nizhny Novgorod State Technical University n.a. R.E. Alekseev

Most of the information security incidents are due to the impact of internal threats - leakage and theft of information, leakage of commercial secrets and personal data of the organization's clients, damage to the information system is usually associated with the actions of employees of this organization.
The motives of such employees may be different. They can act out of personal interests, from the desire to earn at the expense of private confidential information, or act in the interests of the company-competitor. Still yesterday, an employee loyal to his employer, for whatever reasons, at any time can cause many problems for the company.
To date, many companies use different personnel control systems to optimize the workflow. Monitoring staff can detect the presence of many problems. Personnel control systems give managers an idea of what employees do in the workplace. The security service can analyze whose activities are harmful and contrary to the security policy. Engineers will be able to identify the causes of failures in the information infrastructure. Total control of the worker's actions can negatively affect the atmosphere within the collective. Despite this, in order to ensure the security of the company, monitoring the network activity of personnel is necessary to conduct.
As long as a person participates in the work of the company, the influence of the human factor is the primary source of internal threats to the company's information security. Only the integrated use of technical and software tools, as well as organizational measures, can enable a large level of information protection of the enterprise.

  1. Koneev I.R., Belyaev A.V. Informaczionnaya bezopasnost' predpriyatiya. M.: BXV-Peterburg. 2004. 752 c.
  2. Monitoring sotrudnikov: kak nezametno vy'chislit' bezdel'nikov. URL = (05.03.2016).
  3. Sistemy' kontrolya sotrudnikov i ucheta rabochego vremeni. URL = (06.03.2016).
  4. Squid – proksi server. URL = (06.03.2016).

© Издательство «РАДИОТЕХНИКА», 2004-2017            Тел.: (495) 625-9241                   Designed by [SWAP]Studio