International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 7, July 2017


Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad | Dr. D S. Bhosle [2]


Abstract: Data Leakage is characterized as the unplanned or inadvertent appropriation of private or sensitive information to an unapproved subject. Sensitive information in organizations and associations incorporate protected innovation (IP), money related data, understanding data, individual credit card information, and other data relying upon the business. Data Leakage represents a major issue for organizations as the quantity of occurrences and the cost to those encountering them keep on increasing. Data Leakage is improved by the way that transmitted information (both inbound and out-bound), including messages, texting, site structures, and document exchanges among others, are to a great extent unregulated and unmonitored on their way to their goals. The potential harm and antagonistic outcomes of an Data Leakage occurrence can be characterized into two classes Direct and Indirect Losses. Coordinate misfortunes allude to substantial harm that is anything but difficult to quantify or to gauge quantitatively. Backhanded misfortunes, then again, are considerably harder to evaluate and have a substantially more extensive effect as far as cost, place, and time. Direct losses include violations of regulations (such as protecting privacy information, files data) resulting in fines, settlements or customer enumerations fees litigation involving lawsuits loss of future sales costs of investigation and remedial or restoration fees. Indirect losses include varying share price as a result of negative publicity damage to a companys goodwill and reputation customer abandonment and exposure of intellectual property to competitors.


Keywords: Data leakage detection, privacy information, data security


Edition: Volume 6 Issue 7, July 2017,


Pages: 2116 - 2120


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Nisha D.Gaikwad, Dr. D S. Bhosle, "Review on Data Leakage Detection & Data Prevention Techniques", International Journal of Science and Research (IJSR), Volume 6 Issue 7, July 2017, pp. 2116-2120, https://www.ijsr.net/get_abstract.php?paper_id=ART20175726

Similar Articles with Keyword 'Data leakage detection'

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan | Minu Lalitha Madhavu [2]

Share this Article

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan | Ashwini Choutmol | Rahul Shelke | Satish Shelar

Share this Article
Top