Review on Data Leakage Detection & Data Prevention Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 7, July 2017

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Data Leakage is characterized as the unplanned or inadvertent appropriation of private or sensitive information to an unapproved subject. Sensitive information in organizations and associations incorporate protected innovation (IP), money related data, understanding data, individual credit card information, and other data relying upon the business. Data Leakage represents a major issue for organizations as the quantity of occurrences and the cost to those encountering them keep on increasing. Data Leakage is improved by the way that transmitted information (both inbound and out-bound), including messages, texting, site structures, and document exchanges among others, are to a great extent unregulated and unmonitored on their way to their goals. The potential harm and antagonistic outcomes of an Data Leakage occurrence can be characterized into two classes Direct and Indirect Losses. Coordinate misfortunes allude to substantial harm that is anything but difficult to quantify or to gauge quantitatively. Backhanded misfortunes, then again, are considerably harder to evaluate and have a substantially more extensive effect as far as cost, place, and time. Direct losses include violations of regulations (such as protecting privacy information, files data) resulting in fines, settlements or customer enumerations fees litigation involving lawsuits loss of future sales costs of investigation and remedial or restoration fees. Indirect losses include varying share price as a result of negative publicity damage to a companys goodwill and reputation customer abandonment and exposure of intellectual property to competitors.

Keywords: Data leakage detection, privacy information, data security

Edition: Volume 6 Issue 7, July 2017

Pages: 2116 - 2120

Share this Article

How to Cite this Article?

Nisha D.Gaikwad, Dr. D S. Bhosle, "Review on Data Leakage Detection & Data Prevention Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20175726, Volume 6 Issue 7, July 2017, 2116 - 2120

117 PDF Views | 107 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data leakage detection'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2116 - 2120

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Share this Article

Similar Articles with Keyword 'privacy information'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2156 - 2159

Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner

Sanjyot A. Biranje, Dr. D S. Bhosle

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2116 - 2120

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Share this Article

Similar Articles with Keyword 'data security'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1363 - 1366

Internet of Things & Creation of the Fifth V of Big Data

Shaurya Shekhar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1912 - 1916

Survey on Privacy Preserving and Data Security Techniques

Pramila Kharat, Amar Buchade

Share this Article
Top