1 - 8 of 8 Chapters
[The NIST Computer Security Handbook [NIST, 1995] defines the term computer security as “protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes...
[Data leakage is defined as the accidental or unintentional distribution of private or sensitive data to an unauthorized entity. Sensitive data in companies and organizations include intellectual property (IP), financial information, patient information, personal credit-card data, and other...
[DLP solutions can be characterized according to a taxonomy that incorporates the following attributes: data state, deployment scheme, leakage handling approach, and action taken upon leakage (Figure 3.1).]
[According to the Forrester Wave report [Raschke, 2008], most early DLP solutions focused on finding sensitive data as they left the organizational network by monitoring data-in-motion at the various network egress points. In the second stage, as removable storage devices (e.g., USB sticks,...
[Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.]
[Data anonymization aims to mitigate privacy and security concerns and to comply with legal requirements by obfuscating personal details [Fung, 2010]. In this way, data anonymization prevents an adversary from mapping sensitive information to an individual. There are three primary circumstances...
[This chapter presents three case studies in the data leakage domain and the methods proposed and evaluated for mitigating the threat of data leakage. The case studies are: detecting an insider attempting to misuse and leak data stored in a database system; using honeytokens to detect insider...
[This book provides a systematic study of the data leakage prevention domain. This study is based on a taxonomy that characterizes various aspects of the data leakage problem. An analysis of current industrial solutions and the research state of the art is presented.]
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.