You are on page 1of 13

NETWORK SECURITY

MONITORING SYSTEM (NSMS)

BY : Mohammed Musab
Ashraf Shaikh

College : M.H Saboo Siddik Polytechnic


CONTENTS

• INTRODUCTION

• FEATURES

• PROBLEM STATEMENT

• BLOCK DIAGRAM
OUR PROJECT
A network monitoring system that allows the admin to
keep track of the users activity and ensure its security. It
provides features such as website blocking, session time
monitoring, and even key logging.
01
INTRODUCTION
NETWORK SECURITY MONITORING SYSTEM(NSMS)
INTRODUCTION
A network monitoring system that allows the admin to keep track of the users activity and ensure its
security. It provides features such as website blocking, session time monitoring, and even key
logging.
These features enable individuals and businesses to have better control over their networks, limit the
access of unwanted sites or users, and prevent unauthorized access to sensitive data. The app can be
used to track the activity of employees or children to ensure that they are not accessing inappropriate
content or wasting company time.
02
FEATURES
NETWORK SECURITY MONITORING SYSTEM(NSMS)
FEATURES
A network monitoring system that allows the admin to keep track of the users activity and ensure its
security. It provides features such as:

SESSION LOGIN- Our system has this feature where it records the session time of the end user or
client. It contains the information of the user login and logout time.

WEBSITE BLOCKER- We can block any website we want which will be blocked to the user and the
user will be not able to access the site.

KEYLOGGER- This feature is one of the best security feature. It detects the users keystroke made on
a computer or mobile device keyboard. Keyloggers can be used for legitimate purposes, such as
monitoring employee activity on company-owned devices or tracking children's online activity.
03
PROBLEM STATEMENT
NETWORK SECURITY MONITORING SYSTEM(NSMS)
PROBLEM STATEMENT
Abuse of User Account Privileges:

Insiders were responsible for 60% of all attacks in 2016, according to the Harvard Business Review.

Account privilege abuse can be the result of honest mistakes or intentional misuse.

This is a significant concern in today's digital age, as it can lead to data breaches and other security
incidents.
PROBLEM STATEMENT
Irrelevant Searches:

In academic and professional settings, there may be restrictions on the types of searches that can be
conducted on work devices.

Our keylogger feature can monitor and track every search conducted on the device.

This helps to ensure that users are using their work devices in an appropriate and productive manner.
04
BLOCK DIAGRAM
NETWORK SECURITY MONITORING SYSTEM(NSMS)
BLOCK DIAGRAM
THANKS!

You might also like