2.                 LITERATURE SURVEY


     This literature survey compiles various books, research papers, and articles that provide foundational and advanced insights into monitoring, detection, and alert systems in computer security. It specifically focuses on clipboard monitoring, AI tool detection, keylogging, system process monitoring, and email alert systems.


2.1 System Monitoring and Process Detection

Objective: To detect anomalies or malicious behavior in running system processes.
Key Findings:


2.2 Clipboard Monitoring and Keylogging

Objective: Monitor clipboard activity and detect unauthorized access or suspicious usage.
Key Findings:


2.3 AI Tool Detection

Objective: Detect usage of specific AI tools based on process and window monitoring.
Key Findings:


 

 

2.4 Email Alert Systems and Screenshots

Objective: Use automated alerts, including screenshots, to notify users or administrators of detected events.
Key Findings:


2.5 Legal and Ethical Implications

Objective: Explore ethical and legal boundaries in implementing monitoring systems.
Key Findings:

Highlighted penalties for misuse or unauthorized surveillance.