A Survey of Data Leakage Detection and Prevention Solutions by Asaf Shabtai,Yuval Elovici,Lior Rokach

By Asaf Shabtai,Yuval Elovici,Lior Rokach

SpringerBriefs current concise summaries of state of the art learn and functional purposes throughout a large spectrum of fields. that includes compact volumes of fifty to a hundred pages (approximately 20,000- 40,000 words), the sequence covers a variety of content material from specialist to educational. Briefs enable authors to provide their rules and readers to take in them with minimum time funding. As a part of Springer’s booklet assortment, SpringBriefs are released to hundreds of thousands of clients world wide.

Information/Data Leakage poses a significant risk to businesses and firms, because the variety of leakage incidents and the price they inflict keeps to extend. even if attributable to malicious purpose, or an inadvertent mistake, info loss can cut back a company’s model, lessen shareholder price, and harm the company’s goodwill and attractiveness. This publication goals to supply a structural and complete evaluate of the sensible suggestions and present study within the DLP area. this can be the 1st entire ebook that's committed completely to the sphere of knowledge leakage and covers all vital demanding situations and methods to mitigate them. Its informative, actual pages will offer researchers, scholars and practitioners within the with a finished, but concise and handy reference resource to this interesting field.

We have grouped current options into assorted different types in response to a defined taxonomy. The offered taxonomy characterizes DLP recommendations in response to a number of facets akin to: leakage resource, facts country, leakage channel, deployment scheme, preventive/detective techniques, and the motion upon leakage. within the advertisement half we evaluation suggestions of the major DLP industry avid gamers in keeping with expert examine experiences and fabric acquired from the internet sites of the proprietors. within the educational half we cluster the educational paintings based on the character of the leakage and safety into numerous different types. ultimately, we describe major facts leakage eventualities and current for every situation the main proper and appropriate resolution or technique that would mitigate and decrease the chance and/or impression of the leakage scenario.

Show description

Read or Download A Survey of Data Leakage Detection and Prevention Solutions (SpringerBriefs in Computer Science) PDF

Best computer information theory books

The TSQL2 Temporal Query Language (The Springer International Series in Engineering and Computer Science)

Temporal databases were an energetic examine subject for no less than fifteen years. in this time, numerous dozen temporal question languages were proposed. Many in the temporal database examine group perceived that the time had come to consolidate techniques to temporal information types and calculus­ dependent question languages, to accomplish a consensus question language and linked information version upon which destiny examine could be established.

Computer Vision and Applications: A Guide for Students and Practitioners: A Guide for Students and Practitioners,Concise Edition

In line with the hugely profitable 3-volume reference guide of machine imaginative and prescient and purposes, this concise variation covers in one quantity the whole spectrum of laptop imaginative and prescient ranging shape the imaging method to high-end algorithms and purposes. This ebook includes 3 components, together with an program gallery.

Economics of Information Security and Privacy III

The Workshop at the Economics of knowledge safeguard (WEIS) is the best discussion board for interdisciplinary scholarship on details protection, combining services from the fields of economics, social technology, enterprise, legislations, coverage and laptop technological know-how. past workshops have explored the position of incentives among attackers and defenders, pointed out industry mess ups dogging net defense, and assessed investments in cyber-defense.

Dynamics of Information Systems: Theory and Applications: 40 (Springer Optimization and Its Applications)

"Dynamics of knowledge structures" provides state of the art study explaining the significance of data within the evolution of a allotted or networked process. This e-book offers options for measuring the price or value of knowledge in the context of a process. every one bankruptcy finds a special subject or viewpoint from specialists during this interesting quarter of analysis.

Extra info for A Survey of Data Leakage Detection and Prevention Solutions (SpringerBriefs in Computer Science)

Example text

Download PDF sample

Rated 4.85 of 5 – based on 26 votes