Cyber Security |Methods Of Surveillance

1.Computer Surveillance:-

Computer surveillance refers to monitoring computer activities at home or workplace. Meaning, it’s keeping an eye on all the activities and tasks that are being done on any computer you chose.

2.Phones Surveillance:-

Phone surveillance is the act of performing surveillance on phone conversations, location tracking and data monitoring of a phone.

3.Cameras Surveillance:-

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer.

4.Social network analysis:-

Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of nodes (individual actors, people, or things within the network) and the ties, edges, or links (relationships or interactions) that connect them.

5. Biometrics Surveillance :-

Biometrics in video surveillance refers to those biometrics in which biometric images, e.g., those of face, gait or iris, are captured using surveillance videos operating at a distance from the human body. They are among the most challenging forms of biometric technologies.

6.Aerial Surveillance:-

Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle — such as an unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.

7.Corporate Surveillance:-

Corporate surveillance is the monitoring of a person or group’s behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies.

8.Data mining:-

Data Mining is the process of identifying patterns in the pre-built database.

9.Data profiling :-

is the process of examining the data available from an existing information source (e.g. a database or a file) and collecting statistics or informative summaries about that data. The purpose of these statistics may be to: Find out whether existing data can be easily used for other purposes.

10.Human operatives:-

An informant (also called an informer) is a person who provides privileged information about a person or organization to an agency.

The term is usually used within the law enforcement world, where they are officially known as confidential human source (CHS), cooperating witness (CW), or criminal informants (CI).

11.Satellite imagery:-

A reconnaissance satellite or spy satellite is a low-orbiting satellite that collects information about civilian and military installations in other countries using an optical or radar system

12.Identification and credentials

13.Wireless Tracking :-

Wireless RTLS tags are attached to objects or worn by people, and in most RTLS, fixed reference points receive wireless signals from tags to determine their location. … RTLS are a form of local positioning system, and do not usually refer to GPS or to mobile phone tracking.

14.Mobile phones Tracker:-

Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving.

Localization may be effected by a number of technologies, such as using multilateration of radio signals between cell towers of the network and the phone, or simply using GPS.

15. RFID tagging:-

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.

An RFID tag consists of a tiny radio transponder; a radio receiver and transmitter. RFID is one method of automatic identification and data capture (AIDC).

16. RFID tagging on humans:-

A human microchip implant is typically an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being.

This type of subdermal implant usually contains a unique ID number that can be linked to information contained in an external database, such as personal identification, law enforcement, medical history, medications, allergies, and contact information.

17. Geolocation devices:-

Geolocation is a technology that uses data acquired from an individual’s computer or mobile device to identify or describe the user’s actual physical location.

Geolocation data have a variety of uses, each of which can be tailored to particular apps, environments or enterprises.

18.Postal services:-

Mail Covers: Snail Mail Surveillance.

A mail cover is a surveillance tool used by the Postal Service to monitor the mail of a person suspected of criminal activity by recording the information on the outside of all letters and packages delivered to a home or business

19.Stakeout:-

a surveillance maintained by the police of an area or a person suspected of criminal activity.

20.Internet of things:-

The Internet of Things (IoT) is helping create safer cities, homes, and businesses by enabling both private and public organizations to securely and remotely monitor facilities and public spaces in real-time with smart security and surveillance solutions.

--

--

--

InfoSec Writer/Instructor/Custom Course Creator Bug Bounty Hunter Penetration Tester

Love podcasts or audiobooks? Learn on the go with our new app.

Ethical Hacking — Introduction to Threats

With a $7 million prize pool and over 70 participating teams, the ZPRIZE is here!

Zero Trust for Software Updates

Breaking Down the Flavors of Two-Factor

{UPDATE} 4 Pics 1 Word, Brain Challenge Hack Free Resources Generator

Flash Stock Firmware on Samsung GALAXY ALPHA SM-G850L

Flash Stock Rom on Samsung Galaxy

Nitro Network Partners With Cointelegraph To Bring Decentralized Internet To The Masses

Datadog to acquire Hdiv Security

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Akash Ranjan Patel

Akash Ranjan Patel

InfoSec Writer/Instructor/Custom Course Creator Bug Bounty Hunter Penetration Tester

More from Medium

Aix-en-Provence — Travel Off the Beaten Path

The Near Future Report Review: Is Jeff Brown Legit? — Canvas …

How To Collect And Redeem Parallel TCG Packs (For PDIV And On)

RiceDay — Project report