Just like NVR (Network Video Recorder) and DVR (Digital Video Recorder), I was wondering if there’s a term / acronym for Desktop Monitoring Recorder? Perhaps DMR? I can’t find any standard terms for this type of system.
I’m writing a system which is just like an NVR but records / monitors computer desktops instead. It’s not a “screen thief” or “desktop spy” or any type of malware – it’s a surveillance system, only for computers rather than cameras. In the end, it will do things such as primarily monitoring/recording screens, watching for mouse movement when the computer user shouldn’t be there, and more. There are also other commands such as taking control of the screen, executing remote shutdown / restart, posting messages to the user’s screen, and more.
Is there a particular standard term or acronym for the recording software side of this?
5
Over the Shoulder and Behind the Keys (OSBK) *
*contrived, no such system is known to exist by this name
-
Introduction to Audits
-
Past Announcement for a Presentation: Video Surveillance Technologies for
Retail Security (VISITORS); retail video monitoring for among
other reasons, loss prevention -
Brochure: CISCO Video Retail Video Surveillance, contains intro
to Cisco Smart+Connected Retail Network; I think IBM and Oracle have or could easily offer similar systems, not to necessarily single out Cisco.
Such systems exist, but as I have never been on the design end of such systems, I cannot suggest how the names came about. At essence though, they are fully integrated audit and control systems.
The operating environment featured a complete audit and control mechanism that monitored all system and user activity. In addition, a physical access control system and a high-resolution/low sampling rate camera system monitored the occupants or nearby onlookers of the computer.
However, because the system was for highly sensitive or secret information, they never recorded the screen directly (without explicit cause). This allowed some separation and protection from routine review of either footage or logs by access control personnel; yet, still provided full and precise forensic capability if the need arose.
When the need arose, it was merely a matter of synchronizing the two streams together during playback to recreate the conditions at the time in question and validate who, when, where, how, and what occurred. The why was often left to deduction or admission.
Why was it setup like this? The concern of system access and audit control was a separate concern from physical access. By keeping the concerns separate, each functional and responsible monitoring agent only had to be particularly vigilant and knowledgeable of their realm. Often times because the information was highly sensitive or secret, each monitoring agent did not have a ‘need to know’, and by keeping the aspects separate, it reduced the risk that they would inadvertently gain too much knowledge of the subject material being monitored.
As a user, I would find it difficult to accept working in conditions where real-time integration of all the monitoring information occurred without significant cause, and I suspect that it would be subject to greater risk of unchecked abuse or even misuse. I am not suggesting it is a bad idea, just that it would be a slim market, and reputation/trust would probably be an overwhelming factor.
4