Downloading: Review on Data Leakage Detection & Data Prevention Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR) | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

To prevent Server Overload, Your Article PDF will be Downloaded in Next Seconds

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Abstract: Data Leakage is characterized as the unplanned or inadvertent appropriation of private or sensitive information to an unapproved subject. Sensitive information in organizations and associations incorporate protected innovation (IP), money related data, understanding data, individual credit card information, and other data relying upon the business. Data Leakage represents a major issue for organizations as the quantity of occurrences and the cost to those encountering them keep on increasing. Data Leakage is improved by the way that transmitted information (both inbound and out-bound), including messages, texting, site structures, and document exchanges among others, are to a great extent unregulated and unmonitored on their way to their goals. The potential harm and antagonistic outcomes of an Data Leakage occurrence can be characterized into two classes Direct and Indirect Losses. Coordinate misfortunes allude to substantial harm that is anything but difficult to quantify or to gauge quantitatively. Backhanded misfortunes, then again, are considerably harder to evaluate and have a substantially more extensive effect as far as cost, place, and time. Direct losses include violations of regulations (such as protecting privacy information, files data) resulting in fines, settlements or customer enumerations fees litigation involving lawsuits loss of future sales costs of investigation and remedial or restoration fees. Indirect losses include varying share price as a result of negative publicity damage to a companys goodwill and reputation customer abandonment and exposure of intellectual property to competitors.

Keywords: Data leakage detection, privacy information, data security