Cargando…

A Survey of Data Leakage Detection and Prevention Solutions

SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages (approximately 20,000- 40,000 words), the series covers a range of content from professional to academic. Briefs allow authors t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Shabtai, Asaf (Autor), Elovici, Yuval (Autor), Rokach, Lior (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer New York : Imprint: Springer, 2012.
Edición:1st ed. 2012.
Colección:SpringerBriefs in Computer Science,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4614-2053-8
003 DE-He213
005 20220120152517.0
007 cr nn 008mamaa
008 120314s2012 xxu| s |||| 0|eng d
020 |a 9781461420538  |9 978-1-4614-2053-8 
024 7 |a 10.1007/978-1-4614-2053-8  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Shabtai, Asaf.  |e author.  |0 (orcid)0000-0003-0630-4059  |1 https://orcid.org/0000-0003-0630-4059  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 2 |a A Survey of Data Leakage Detection and Prevention Solutions  |h [electronic resource] /  |c by Asaf Shabtai, Yuval Elovici, Lior Rokach. 
250 |a 1st ed. 2012. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2012. 
300 |a VIII, 92 p. 9 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5776 
505 0 |a Introduction to Information Security -- Data Leakage -- A Taxonomy of Data Leakage Prevention Solutions -- Data Leakage Detection / Prevention Solutions -- Data Leakage / Misuse Scenarios -- Privacy, Data Anonymization, and Secure Data Publishing -- Case studies -- Future Trends in Data Leakage -- References. 
520 |a SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages (approximately 20,000- 40,000 words), the series covers a range of content from professional to academic. Briefs allow authors to present their ideas and readers to absorb them with minimal time investment. As part of Springer's eBook collection, SpringBriefs are published to millions of users worldwide. Information/Data Leakage poses a serious threat to companies and organizations, as the number of leakage incidents and the cost they inflict continues to increase. Whether caused by malicious intent, or an inadvertent mistake, data loss can diminish a company's brand, reduce shareholder value, and damage the company's goodwill and reputation. This book aims to provide a structural and comprehensive overview of the practical solutions and current research in the DLP domain. This is the first comprehensive book that is dedicated entirely to the field of data leakage and covers all important challenges and techniques to mitigate them. Its informative, factual pages will provide researchers, students and practitioners in the industry with a comprehensive, yet concise and convenient reference source to this fascinating field. We have grouped existing solutions into different categories based on a described taxonomy. The presented taxonomy characterizes DLP solutions according to various aspects such as: leakage source, data state, leakage channel, deployment scheme, preventive/detective approaches, and the action upon leakage. In the commercial part we review solutions of the leading DLP market players based on professional research reports and material obtained from the websites of the vendors. In the academic part we cluster the academic work according to the nature of the leakage and protection into various categories. Finally, we describe main data leakage scenarios and present for each scenario the most relevant and applicable solution or approach that will mitigate and reduce the likelihood and/or impact of the leakage scenario. 
650 0 |a Data protection. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Database management. 
650 0 |a Computer networks . 
650 1 4 |a Data and Information Security. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Database Management. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Elovici, Yuval.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Rokach, Lior.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781461420521 
776 0 8 |i Printed edition:  |z 9781461420545 
830 0 |a SpringerBriefs in Computer Science,  |x 2191-5776 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4614-2053-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)