Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A Survey of Data Leakage Detection and Prevention SolutionsData Leakage/Misuse Scenarios

A Survey of Data Leakage Detection and Prevention Solutions: Data Leakage/Misuse Scenarios [Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

A Survey of Data Leakage Detection and Prevention SolutionsData Leakage/Misuse Scenarios

Loading next page...
 
/lp/springer-journals/a-survey-of-data-leakage-detection-and-prevention-solutions-data-FBZTyoRJd6

References (0)

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Springer US
Copyright
© The Author(s) 2012
ISBN
978-1-4614-2052-1
Pages
39 –46
DOI
10.1007/978-1-4614-2053-8_5
Publisher site
See Chapter on Publisher Site

Abstract

[Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.]

Published: Feb 14, 2012

Keywords: Leak Incidence; Honeypot; Unintentional Cases; Third-party Location; Unintentional Leakage

There are no references for this article.