Data Leakage and Detection of Guilty Agent
نویسندگان
چکیده
Organizations apply data or information security only in terms of protecting their network from intruders (e.g. hackers) but with growing amount of sensitive data and rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points (machines and servers) and easier modes of communication, sometime accidental or even deliberate leakage of data from within the organization has become a painful reality. This has lead to growing awareness about sensitive data security in general and about outbound content management in particular.
منابع مشابه
A Review on Data Leakage Detection
This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...
متن کاملData Leakage Detection: A Survey
This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...
متن کاملBuilding of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage
1. ABSTRACT Now days, many organizations outsource some of their important data to some outside trusted agents. This outsourced data coming from the data warehouse of the organization through ETL process may have some sensitive information. Though the agents are trusted one, the sensitive data may be given by them to some outside untrustworthy third party. This is known as data leakage. Such a ...
متن کاملThe Guilt Detection Approach in Data Leakage Detection
In the virtual and widely distributed network, the process of handover sensitive data from the distributor to the trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of service based on the demand of users A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leake...
متن کاملبازشناسی دانش فرد خطاکار به کمک سیگنالهای تک ثبت مغزی، مبتنی بر روش غیرخطی منحنیهای بازگشتی
In this study, Recurrence Plots (RPs) has been adapted as a nonlinear approach in order to detection of guilty subjects’ knowledge based on their single-trial ERPs. The dataset were acquired from 49 human subjects who were participated in a Concealed Information Test (CIT). According to the test protocol, guilty subjects denied their information about familiar faces, so the aim was to detect th...
متن کامل