There are also many legitimate ways administrators use screen capture tool. However, capturing screen activity can be done for malicious purposes. In this video, Lisa Bock explores some of the practical uses for monitoring a user remotely. Understand best practices for user education regarding screen capture, both at home and in the workplace.
- Capturing screen activity is another form of spyware. However, there are a number of valid reasons why we might monitor someone's screen. For example, if monitoring children's activity, we can monitor for online predators, cyberbullying, exposure of personal information that might result in identify theft or fraud, or excessive screen time. In a corporate environment, employees should not have any expectations of privacy, as there may be monitoring for a number of reasons, such as monitoring for viruses or malware, or perhaps exposure of sensitive information.
In schools, teachers use screen monitoring to watch for inappropriate behavior and evidence of cheating during a test. In most cases, good practice has written policies about screen monitoring or if at home, there is a discussion on screen monitoring. However, understand that screen monitoring software can be installed without someone's knowledge and all activity can be monitored. Now, there are a number of screen monitoring tools available.
I've downloaded a free trial of ScreenFetch to get an idea of what monitoring looks like when observing someone else's screen. Here, you can see at their website, they offer a free trial, which you can try yourself. Right now, I'm in the ScreenFetch console and I'm monitoring someone else's screen. So, here you can see that I can see everything that's taking place, what is written, and what type of behavior is being done. Screen monitoring is another form of spyware and with screen monitoring software, I can capture all activity.
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks