International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 189

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 7, July 2017


Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad | Dr. D S. Bhosle [2]


Abstract: Data Leakage is characterized as the unplanned or inadvertent appropriation of private or sensitive information to an unapproved subject. Sensitive information in organizations and associations incorporate protected innovation (IP), money related data, understanding data, individual credit card information, and other data relying upon the business. Data Leakage represents a major issue for organizations as the quantity of occurrences and the cost to those encountering them keep on increasing. Data Leakage is improved by the way that transmitted information (both inbound and out-bound), including messages, texting, site structures, and document exchanges among others, are to a great extent unregulated and unmonitored on their way to their goals. The potential harm and antagonistic outcomes of an Data Leakage occurrence can be characterized into two classes Direct and Indirect Losses. Coordinate misfortunes allude to substantial harm that is anything but difficult to quantify or to gauge quantitatively. Backhanded misfortunes, then again, are considerably harder to evaluate and have a substantially more extensive effect as far as cost, place, and time. Direct losses include violations of regulations (such as protecting privacy information, files data) resulting in fines, settlements or customer enumerations fees litigation involving lawsuits loss of future sales costs of investigation and remedial or restoration fees. Indirect losses include varying share price as a result of negative publicity damage to a companys goodwill and reputation customer abandonment and exposure of intellectual property to competitors.


Keywords: Data leakage detection, privacy information, data security


Edition: Volume 6 Issue 7, July 2017,


Pages: 2116 - 2120


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top