Data Leakage

Submitted by: Submitted by

Views: 10

Words: 4355

Pages: 18

Category: Other Topics

Date Submitted: 09/16/2015 09:05 PM

Report This Essay

International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012

ISSN 2229-5518

1

Data Leakage and Detection of Guilty Agent

Rupesh Mishra, D.K. Chitre

Abstract— Organizations apply data or information security only in terms of protecting their network from intruders (e.g. hackers) but with

growing amount of sensitive data and rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points

(machines and servers) and easier modes of communication, sometime accidental or even deliberate leakage of data from within the

organization has become a painful reality. This has lead to growing awareness about sensitive data security in general and about outbound

content management in particular.

Index Terms— Allocation strategies, Data distribution, Data leakage, Data privacy, Fake records, Guilty agent, Leakage Model.

——————————  ——————————

1 INTRODUCTION

D

ATA leakage is the unauthorized transmission of data or

information from within an organization to an external

destination or recipient. This may be electronic, or may

be via a physical method [1]. Data Leakage is synonymous

with the term Information Leakage. Here unauthorized does

not actually mean intentional or malicious. Even unintentional

or inadvertent data leakage is also unauthorized. The protection measure must be taken to secure these valuable data because if data is leaked from an organization and cybercriminals ―cash out‖ or sell this data for profit it costs organizations

money, damages the brand, image and destroys customer

trust.

In the course of doing business, sometimes sensitive data

must be handed over to supposedly trusted third parties for

some enhancement or operations, for example, a hospital may

give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing of customer data. Another

enterprise may outsource...