05-04-2017, 03:08 PM
According to Gordon (2007), Data Leakage, in a nutshell, is the unauthorized transmission of data (or information) from within an organization to an external destination or recipient. This may be electronic, or it may be through a physical method. According to Wikipedia, data loss, which means a loss of data that occurs on any device that stores data, is a problem for anyone who uses a computer. Data loss occurs when data can be physically or logically deleted from the organization intentionally or not. Data loss has become a major problem in the organization today, where organizations have a responsibility to overcome this problem. Data leakage is also an incident when the confidentiality of the information has been compromised. Refers to an unauthorized transmission of data from an organization to an external destination.
Data security gaps encompass the broader information technology (IT) environment, such as (in order of probability):
• Lost or stolen laptops
• Corporate and web-based email
• Flash drives, external hard drives, and flash drives
• Optical media (CD / DVD)
• Other websites
• Social networking tools and other applications (such as instant messaging and
• File Transfer Protocol (FTP)
The data leakage industry is very heterogeneous as it evolves not from the product lines of the leading IT security vendors. The use of enabling technologies such as firewalls, encryption, access control, identity management, machine learning detectors and context-based detectors has been incorporated to provide protection against various factors from the threat of data leakage. Data leakage is a major challenge for organizations and institutions. Although there are a number of systems and methods designed to ensure data security by using various encryption algorithms, there is a large problem of user integrity. Data leakage can be achieved simply by mentally remembering what was seen and by physically removing tapes, disks and reports or by subtle means such as data concealment.