Data Leakage and Detection of Guilty Agent

نویسندگان

  • Rupesh Mishra
  • D. K. Chitre
چکیده

Organizations apply data or information security only in terms of protecting their network from intruders (e.g. hackers) but with growing amount of sensitive data and rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points (machines and servers) and easier modes of communication, sometime accidental or even deliberate leakage of data from within the organization has become a painful reality. This has lead to growing awareness about sensitive data security in general and about outbound content management in particular.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review on Data Leakage Detection

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

متن کامل

Data Leakage Detection: A Survey

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

متن کامل

Building of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage

1. ABSTRACT Now days, many organizations outsource some of their important data to some outside trusted agents. This outsourced data coming from the data warehouse of the organization through ETL process may have some sensitive information. Though the agents are trusted one, the sensitive data may be given by them to some outside untrustworthy third party. This is known as data leakage. Such a ...

متن کامل

The Guilt Detection Approach in Data Leakage Detection

In the virtual and widely distributed network, the process of handover sensitive data from the distributor to the trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of service based on the demand of users A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leake...

متن کامل

بازشناسی دانش فرد خطاکار به کمک سیگنال‌های تک ثبت مغزی، مبتنی بر روش غیرخطی منحنی‌های بازگشتی

In this study, Recurrence Plots (RPs) has been adapted as a nonlinear approach in order to detection of guilty subjects’ knowledge based on their single-trial ERPs. The dataset were acquired from 49 human subjects who were participated in a Concealed Information Test (CIT). According to the test protocol, guilty subjects denied their information about familiar faces, so the aim was to detect th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012