Review on Data Leakage Detection & Data Prevention Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 119 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 7, July 2017

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Data Leakage is characterized as the unplanned or inadvertent appropriation of private or sensitive information to an unapproved subject. Sensitive information in organizations and associations incorporate protected innovation (IP), money related data, understanding data, individual credit card information, and other data relying upon the business. Data Leakage represents a major issue for organizations as the quantity of occurrences and the cost to those encountering them keep on increasing. Data Leakage is improved by the way that transmitted information (both inbound and out-bound), including messages, texting, site structures, and document exchanges among others, are to a great extent unregulated and unmonitored on their way to their goals. The potential harm and antagonistic outcomes of an Data Leakage occurrence can be characterized into two classes Direct and Indirect Losses. Coordinate misfortunes allude to substantial harm that is anything but difficult to quantify or to gauge quantitatively. Backhanded misfortunes, then again, are considerably harder to evaluate and have a substantially more extensive effect as far as cost, place, and time. Direct losses include violations of regulations (such as protecting privacy information, files data) resulting in fines, settlements or customer enumerations fees litigation involving lawsuits loss of future sales costs of investigation and remedial or restoration fees. Indirect losses include varying share price as a result of negative publicity damage to a companys goodwill and reputation customer abandonment and exposure of intellectual property to competitors.

Keywords: Data leakage detection, privacy information, data security

Edition: Volume 6 Issue 7, July 2017

Pages: 2116 - 2120

Share this Article

How to Cite this Article?

Nisha D.Gaikwad, Dr. D S. Bhosle, "Review on Data Leakage Detection & Data Prevention Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20175726, Volume 6 Issue 7, July 2017, 2116 - 2120

Enter Your Registered Email Address





Similar Articles with Keyword 'Data leakage detection'

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this Article

Downloads: 119 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2116 - 2120

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Share this Article

Similar Articles with Keyword 'privacy information'

Downloads: 109 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Downloads: 112 | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2156 - 2159

Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner

Sanjyot A. Biranje, Dr. D S. Bhosle

Share this Article

Downloads: 119 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2116 - 2120

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Share this Article

Similar Articles with Keyword 'data security'

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Downloads: 101 | Weekly Hits: ⮙4 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Downloads: 104 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1696 - 1700

Data Security Policies in Cloud: A Survey

Kasundra Punitkumar R., Shikha J. Pachouly

Share this Article

Downloads: 104 | Weekly Hits: ⮙5 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article



Top