Downloads: 120 | Views: 272
Review Papers | Computer Science & Engineering | India | Volume 6 Issue 7, July 2017 | Popularity: 7 / 10
Review on Data Leakage Detection & Data Prevention Techniques
Nisha D.Gaikwad, Dr. D S. Bhosle
Abstract: Data Leakage is characterized as the unplanned or inadvertent appropriation of private or sensitive information to an unapproved subject. Sensitive information in organizations and associations incorporate protected innovation (IP), money related data, understanding data, individual credit card information, and other data relying upon the business. Data Leakage represents a major issue for organizations as the quantity of occurrences and the cost to those encountering them keep on increasing. Data Leakage is improved by the way that transmitted information (both inbound and out-bound), including messages, texting, site structures, and document exchanges among others, are to a great extent unregulated and unmonitored on their way to their goals. The potential harm and antagonistic outcomes of an Data Leakage occurrence can be characterized into two classes Direct and Indirect Losses. Coordinate misfortunes allude to substantial harm that is anything but difficult to quantify or to gauge quantitatively. Backhanded misfortunes, then again, are considerably harder to evaluate and have a substantially more extensive effect as far as cost, place, and time. Direct losses include violations of regulations (such as protecting privacy information, files data) resulting in fines, settlements or customer enumerations fees litigation involving lawsuits loss of future sales costs of investigation and remedial or restoration fees. Indirect losses include varying share price as a result of negative publicity damage to a companys goodwill and reputation customer abandonment and exposure of intellectual property to competitors.
Keywords: Data leakage detection, privacy information, data security
Edition: Volume 6 Issue 7, July 2017
Pages: 2116 - 2120
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 625 - 633Ridesharing DApps - A Study on Peer-to-Peer Ridesharing on Ethereum
Tushar S Menon, Aviral Srivastava, Aditya, Dr. Radhika K R
Downloads: 4 | Weekly Hits: ⮙3 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 9 Issue 4, April 2020
Pages: 1837 - 1849Decentralization of Big Data with Blockchain
Venkata Naga Sai Kiran Challa
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 955 - 961Big Data and Impact in DDMRP
Ponnarasan Krishnan