Skip to content

A comprehensive File Monitoring System that tracks file access and usage, with security features for threat detection, mouse and keyboard control for remote computers, and the ability to extend to RDP functionality using JavaScript and Node.js.

Notifications You must be signed in to change notification settings

kartikmehta8/SystemSentry

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

A comprehensive File Monitoring System that tracks file access and usage, with security features for threat detection, mouse and keyboard control for remote computers, and the ability to extend to RDP functionality using JavaScript and Node.js.

Problems with traditional File Systems

  • Inadequate security measures that may lead to unauthorized access and usage of files.
  • Lack of real-time monitoring and control, making it difficult to track and stop malicious activity.
  • Insufficient ability to control remote computers, making it difficult to respond to security threats.
  • Limited integration with antivirus tools, leading to reduced security and protection for the system.
  • Inability to remotely access and control the mouse and keyboard, making it difficult to intervene and respond to security threats.

Why SystemSentry?

  • Improved Security: Incorporate the latest security measures to prevent unauthorized access and ensure the confidentiality of files.
  • Real-Time Monitoring: Use real-time monitoring technology to track and control the usage of files in real-time.
  • Remote Computer Control: Provide the ability to control remote computers, ensuring that security threats can be responded to in real-time.
  • Firewall Integration: Integrate with existing antivirus tools to provide a more comprehensive security solution.
  • Remote Mouse and Keyboard Access: Provide the ability to remotely access and control the mouse and keyboard, making it possible to respond to security threats and intervene if necessary.

Business Model

A subscription-based software-as-a-service (SaaS) model:

  • In this model, we would offer your file monitoring system with threat detection and mouse/keyboard control as a cloud-based service that customers can access through a web interface.
  • Customers would pay a recurring fee, such as monthly or annually, for access to the service.
  • To maximize revenue, we could offer different pricing tiers based on the level of functionality or number of devices being monitored.
  • We could also offer additional services such as custom integrations, technical support, and training to provide more value to your customers.
  • Additionally, we could explore partnerships with antivirus software providers to offer bundled solutions to customers.

Future Prospects

  • Adding features to control and monitor other aspects of the system, such as network traffic, processes, and system logs.
  • Implementing advanced machine learning algorithms to enhance the system's ability to identify and respond to new threats in real-time.
  • Adding a user-friendly interface, such as a web-based dashboard, to make the system easier to use and manage.
  • Implementing advanced encryption and authentication methods to secure the system and protect sensitive data.
  • Adding support for multiple platforms, such as Windows, MacOS, and Linux, to make the system more widely accessible.
  • Integrating with other security tools, such as firewalls, intrusion detection systems, and penetration testing tools, to enhance the overall security posture of the system.

Connected Repositories

  • KEYLOGGER : A Python-based Keylogger that can track your keystrokes, clipboard text, take screenshots at regular intervals, and records audio. It sends the data as SMS to the target phone number using Twilio.
  • INTRUSION DETECTION SYSTEM : The goal is to use machine learning algorithms to detect and classify network intrusions as either "bad connections" or "good connections" for the purpose of continuous monitoring and protecting against unauthorized access.
  • RDP ALTERNATE : The RDP alternative being built provides advantages such as platform independence, improved security, and lower resource requirements.
  • FIREWALL : Network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, preventing unauthorized access to or from a network.

Contributors

About

A comprehensive File Monitoring System that tracks file access and usage, with security features for threat detection, mouse and keyboard control for remote computers, and the ability to extend to RDP functionality using JavaScript and Node.js.

Resources

Stars

Watchers

Forks

Languages

  • Python 100.0%