Data Leakage

نویسنده

  • SIMON BYERS
چکیده

PUBLISHED BY THE IEEE COMPUTER SOCIETY 1540-7993/04/$20.00 © 2004 IEEE IEEE SECURITY & PRIVACY 23 I t is well known among the more technical computer user communities that documents written and stored in the Microsoft Word document format might contain hidden data. Some communities of regular computer users are also aware of this fact—for example, people working in the legal sector. However, awareness of this problem is not sufficiently widespread, especially among nontechnical computer users. Such people typically use computers at work and at home but are not computer professionals; thus, they are probably not aware of the dangers that opaque proprietary file formats can carry in their hidden payloads. This article demonstrates how to automate and scale the search for this hidden text effect. The tools we use are simple and do not require specialized tuning or highly skilled input. We have (and assume) no knowledge of the Word document format itself, reinforcing the simplicity of the techniques discussed. We’ll also consider important but commonly neglected behavior patterns in the context of this problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review on Data Leakage Detection

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

متن کامل

Data Leakage Detection: A Survey

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

متن کامل

An advanced data leakage detection system analyzing relations between data leak activity

In order to prevent the data leakage by the internal staff, the companies protect important information of the company by inputting the behavior pattern related to the data leakage into the system in advance and by defining the employee as the staff who leaked the data, whose behavior pattern is detected when such inputted behavior pattern is detected. However, in the case of the existing syste...

متن کامل

Effect of a ring type barrier and rotational speed on leakage flow of gas turbine brush seal

This paper investigates the effect of inserting a ring type barrier on leakage flow of brush seals with different bristles clearances (the distance between bristle pack tip and rotor surface). The ring is placed on both upstream and downstream sides of the bristles. An axisymmetric CFD model is employed to calculate radial pressure distribution along backing plate, axial pressure variation on r...

متن کامل

Using Unobtrusive Techniques for Detecting Leakage of Data

While doing business, there are situations when some important information or data should be handed over to some third parties. The data important to organization must be secured but the third parties are not that careful about the data. So there is possibility that the data gets leaked. Here in this paper we are considering the chances that the third party is responsible for the leakage. We pr...

متن کامل

A Comparative Evaluation of Data Leakage/loss Prevention Systems (dlps)

Data is the most valuable assets of an organization that need to be secured. Due to limited computational resources, Customers outsource their workload to cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite of tremendous benefits of cloud computing, protection of customers’ confidenti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004