TRACKING DOWN DATA LEAKAGE BY USING ENCRYPTED FAKE OBJECTS
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)Publication Date: 2014-08-30
Authors : Anugu Rahul Reddy; BalaKrishna Bangaru;
Page : 593-596
Keywords : ;
Abstract
This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, leakage or alteration. So, to prevent these problems, a data leakage detection system has been proposed. This paper includes brief idea about data leakage detection and a methodology to detect the data leakage persons.
Other Latest Articles
- User Friendly Data Searching?
- Fully Automated Approach to Identify Brain Tumors in 2D MRI Using Thresholding and Region Growing Method?
- Improved Performance of Ext4 File System by Using Extent-
- “BABYLON” AS A FACTOR OF NATIONAL CONSOLIDATION: EUROPEAN AND UKRAINIAN ASPECTS
- VISUAL COMMUNICATIONS IN THE REPRESENTATION OF FASHION
Last modified: 2014-08-29 03:23:43