SlideShare a Scribd company logo
1 of 15
Company Name: Home Of Dissertations
Website: https://www.dissertationhomework.com
Contact Number: +44 7842798340
Data Leakage prevention (DLP) analysis
(Case Study)
CONNECT NOW
Data Leakage prevention (DLP)
analysis
❖ Background
❖Data leakages are evident
❖Across organizations
❖Data leakage analysis needed
❖ Aims and objectives
❖To explore data leakages and impact
❖To examine DLP techniques
❖To analyze new approaches
❖To develop new DLP solution
❖ Rationale
❖Proper analysis is necessary
❖Especially on data leakages and DLP
❖ Feasibility
❖The research is feasible
Introduction
❑ What is data leakage?
❑Tahboub and Saleh (2014)
❑Noted that Data leakage is
❑Authorized and uncontrolled
❑Transmission of classified information
❑Impact of data leakage
❑ Davis (2019) noted that
❑Data leakage leads to financial loss
❑Damaged reputation
❑Legal ramification
❑ Data leakage prevention
❑DLP addresses protection of data
❑DLP technologies focus on sensitive data
Literature Review
⮚Yoshihama et al. (2010) noted
⮚The essence of fine-grained analysis
⮚ DLP techniques
⮚Raman et al. (2011) noted
⮚That data encryption is necessary
⮚DLP analysis notes the
⮚Detection and prevention methods
⮚ New approaches to DLP
⮚MISTRAL (2018) noted
⮚The essence of Data-in-motion
⮚ and Data-at-Rest DLP
Literature Review…Cont’d
❖ The research selected
❖The Agile SDLC model
❖The model supports
❖Customization of the process
❖ Concept
❖Denotes the objective of
❖The program
❖ Requirements
❖Covers teams, initial support and fund
❖ Design and Development
❖Covers organizational understanding
❖Data understating and preparation
❖Modeling and evaluation
Research Methodology
❑ Deployment
❑Everything is successful
❑And working
❑ Demonstration
❑Demonstrated as a
❑Sign of proof and
❑How effective it can
❑Help organization stop data leakages
❑And do proper analysis
❑ Evaluation
❑Observation and analysis
❑Done at this point
❑Feedbacks will be noted
❑In support of the implementation process
Research Methodology…Cont’d
❑ The CRISP-DM model
❑Plays focal role
❑Data includes
❑Personally identifiable information
❑ Data preparation and modeling
❑Data is converted into raw data
❑Data is exported to TXT format
❑ Modeling was supported by
❑Supervised learning
❑Unsupervised learning
❑Reinforcement learning
❑ Encryption and Decryption
❑Symmetric and asymmetric keys
❑Would be used
Project Design
❖Notable examples include
❖Data encryption standard
❖And triple DES
❖RSA cryptosystem was used as well
❖ NEW DLP Solution
❖The preventive approach
❖Was used
❖Classification of documents
❖Was applied in the learning phase
❖Detection process specified
❖Unknown, confidential
❖And non-confidential data
❖Encryptions utilized RSA and AES
❖The solution quickly
❖Detects damage and encrypts data
❖Both damaged and undamaged
Project Design…Cont’d
Project Design…Cont’d
❖ New DLP solution
❖Is grounded on two aspects
❖Data leakage analysis
❖And Data leakage prevention
❖ Data analysis
❖Understands what is be protected
❖ DLP
❖Protects and classifies documents
❖Cryptography is also addressed
❖At this point
❖DRSM and CRISP-DM were
❖Deployed as data mining tools
Results and Analysis
❖ Learning/Training phase
❖The system need to learn
❖Or trained to identify unknown
❖Confidential and non-confidential
❖ Algorithms
❖AES and RSA were necessary
❖The hybrid format of the keys
❖Ensures reliable protection
❖ Strength and weaknesses
❖It can do both analysis and protection
❖But cannot handle huge data
Results and Analysis…Cont’d
❑ The research focused on
❑DLP analysis and development
❑Of the new DLP solution
❑ Pre-study
❑Explored on DLP
❑ and the available technologies
❑ Methodology
❑Utilized the agile SDLC approach
❑ The developed system
❑Is multi-functional
❑But cannot handle huge files
❑ Recommendations
❑The system need
❑To be customized to meet
❑Different needs and conditions
Conclusion
� Davis, M. (2019). 4 Damaging After-Effects of a Data Breach. Available
at. https://www.cybintsolutions.com/4-damaging-after-effects-of-a-data-
breach/
� MISTRAL. 2018. The two distinct approaches to data loss prevention.
Available at. https://www.mistralsolutions.com/articles/two-distinct-
approaches-data-loss-prevention/
� Tahboub, R. and Saleh, Y., 2014, January. Data leakage/loss prevention
systems (DLP). In 2014 World Congress on Computer
Applications and Information Systems (WCCAIS) (pp. 1- 6). IEEE.
� Yoshihama, S., Mishina, T. and Matsumoto, T., 2010. Web-Based Data
Leakage Prevention. In IWSEC (Short Papers) (pp. 78-93).
References
Contact us now
Website: https://www.dissertationhomework.com
Contact Number: +44 7842798340
THANK YOU !!
Connect Now

More Related Content

Similar to Data Leakage prevention (DLP) analysis.pptx

DAMA - Innovations in DG Architecture and Analytics (online)
DAMA - Innovations in DG Architecture and Analytics (online)DAMA - Innovations in DG Architecture and Analytics (online)
DAMA - Innovations in DG Architecture and Analytics (online)
Robert Quinn
 

Similar to Data Leakage prevention (DLP) analysis.pptx (20)

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
RDC - Benoit Pierenne: Data Interoperability I
RDC - Benoit Pierenne: Data Interoperability IRDC - Benoit Pierenne: Data Interoperability I
RDC - Benoit Pierenne: Data Interoperability I
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
Overcoming Common Data Analysis Challenges.pdf
Overcoming Common Data Analysis Challenges.pdfOvercoming Common Data Analysis Challenges.pdf
Overcoming Common Data Analysis Challenges.pdf
 
Null bachav
Null bachavNull bachav
Null bachav
 
Nervana AI Overview Deck April 2016
Nervana AI Overview Deck April 2016Nervana AI Overview Deck April 2016
Nervana AI Overview Deck April 2016
 
2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorial2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorial
 
Data science; why, what, how?
Data science; why, what, how?Data science; why, what, how?
Data science; why, what, how?
 
TechTalks | Software Security 101: What Every Startup Needs to Know to Protec...
TechTalks | Software Security 101: What Every Startup Needs to Know to Protec...TechTalks | Software Security 101: What Every Startup Needs to Know to Protec...
TechTalks | Software Security 101: What Every Startup Needs to Know to Protec...
 
Simplify analytics
Simplify analyticsSimplify analytics
Simplify analytics
 
Data science unit1
Data science unit1Data science unit1
Data science unit1
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Business Agility Must Be Based on a New Flexible and Agile Data Approach
Business Agility Must Be Based on a New Flexible and Agile Data ApproachBusiness Agility Must Be Based on a New Flexible and Agile Data Approach
Business Agility Must Be Based on a New Flexible and Agile Data Approach
 
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond HillDOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCE
 
Webinar: Overcoming the Five Distributed Data Protection Challenges
Webinar: Overcoming the Five Distributed Data Protection ChallengesWebinar: Overcoming the Five Distributed Data Protection Challenges
Webinar: Overcoming the Five Distributed Data Protection Challenges
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
DAMA - Innovations in DG Architecture and Analytics (online)
DAMA - Innovations in DG Architecture and Analytics (online)DAMA - Innovations in DG Architecture and Analytics (online)
DAMA - Innovations in DG Architecture and Analytics (online)
 

More from lucascyrus

More from lucascyrus (20)

_Contemporary Leadership Themes .pptx
_Contemporary Leadership Themes    .pptx_Contemporary Leadership Themes    .pptx
_Contemporary Leadership Themes .pptx
 
ENTREPRENEURSHIP AND SMALL BUSINESS MANAGEMENT_ THE MINDSET OF THE ENTREPRENEURS
ENTREPRENEURSHIP AND SMALL BUSINESS MANAGEMENT_ THE MINDSET OF THE ENTREPRENEURSENTREPRENEURSHIP AND SMALL BUSINESS MANAGEMENT_ THE MINDSET OF THE ENTREPRENEURS
ENTREPRENEURSHIP AND SMALL BUSINESS MANAGEMENT_ THE MINDSET OF THE ENTREPRENEURS
 
Tesco Analysis .pptx
Tesco Analysis                     .pptxTesco Analysis                     .pptx
Tesco Analysis .pptx
 
Value of Medicine .pptx
Value of Medicine                   .pptxValue of Medicine                   .pptx
Value of Medicine .pptx
 
Review of police leadership and training
Review of police leadership and trainingReview of police leadership and training
Review of police leadership and training
 
FINDING THE EQUILIBRIUM_ WILD SWIMMING AND REGULATION.pptx
FINDING THE EQUILIBRIUM_ WILD SWIMMING AND REGULATION.pptxFINDING THE EQUILIBRIUM_ WILD SWIMMING AND REGULATION.pptx
FINDING THE EQUILIBRIUM_ WILD SWIMMING AND REGULATION.pptx
 
OPERATIONS MANAGEMENT PRACTICE AT DEBENHAMS
OPERATIONS MANAGEMENT PRACTICE AT DEBENHAMSOPERATIONS MANAGEMENT PRACTICE AT DEBENHAMS
OPERATIONS MANAGEMENT PRACTICE AT DEBENHAMS
 
Summative Assignment .pptx
Summative Assignment               .pptxSummative Assignment               .pptx
Summative Assignment .pptx
 
Protein-Enriched Rye Bread for Older Adults.pptx
Protein-Enriched Rye Bread for Older Adults.pptxProtein-Enriched Rye Bread for Older Adults.pptx
Protein-Enriched Rye Bread for Older Adults.pptx
 
HEALTH AND EXERCISE PSYCHOLOGY AE2 .pptx
HEALTH AND EXERCISE PSYCHOLOGY AE2 .pptxHEALTH AND EXERCISE PSYCHOLOGY AE2 .pptx
HEALTH AND EXERCISE PSYCHOLOGY AE2 .pptx
 
PROBLEMS IN BUSINESS .
PROBLEMS IN BUSINESS                             .PROBLEMS IN BUSINESS                             .
PROBLEMS IN BUSINESS .
 
MANAGEMENT ACCOUNTANT_ A CASE STUDY ON WHITES CLEANING.pptx
MANAGEMENT ACCOUNTANT_ A CASE STUDY ON WHITES CLEANING.pptxMANAGEMENT ACCOUNTANT_ A CASE STUDY ON WHITES CLEANING.pptx
MANAGEMENT ACCOUNTANT_ A CASE STUDY ON WHITES CLEANING.pptx
 
Elvaston Castle Analysis. pptx
Elvaston Castle Analysis.           pptxElvaston Castle Analysis.           pptx
Elvaston Castle Analysis. pptx
 
The Costa Concordia case .pptx
The Costa Concordia case           .pptxThe Costa Concordia case           .pptx
The Costa Concordia case .pptx
 
ROLE OF MARKETING AND INTERRELATION BETWEEN MARKETING STRATEGY AND THE ORGANI...
ROLE OF MARKETING AND INTERRELATION BETWEEN MARKETING STRATEGY AND THE ORGANI...ROLE OF MARKETING AND INTERRELATION BETWEEN MARKETING STRATEGY AND THE ORGANI...
ROLE OF MARKETING AND INTERRELATION BETWEEN MARKETING STRATEGY AND THE ORGANI...
 
Pneumonia .
Pneumonia                                 .Pneumonia                                 .
Pneumonia .
 
Patient Care Coordination .pptx
Patient Care Coordination          .pptxPatient Care Coordination          .pptx
Patient Care Coordination .pptx
 
Pedagogy of Geography .ppt
Pedagogy of Geography                  .pptPedagogy of Geography                  .ppt
Pedagogy of Geography .ppt
 
National and international perspectives of health.pptx
National and international perspectives of health.pptxNational and international perspectives of health.pptx
National and international perspectives of health.pptx
 
Summative Submission pptx
Summative Submission                 pptxSummative Submission                 pptx
Summative Submission pptx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 

Data Leakage prevention (DLP) analysis.pptx

  • 1. Company Name: Home Of Dissertations Website: https://www.dissertationhomework.com Contact Number: +44 7842798340 Data Leakage prevention (DLP) analysis (Case Study) CONNECT NOW
  • 2. Data Leakage prevention (DLP) analysis
  • 3. ❖ Background ❖Data leakages are evident ❖Across organizations ❖Data leakage analysis needed ❖ Aims and objectives ❖To explore data leakages and impact ❖To examine DLP techniques ❖To analyze new approaches ❖To develop new DLP solution ❖ Rationale ❖Proper analysis is necessary ❖Especially on data leakages and DLP ❖ Feasibility ❖The research is feasible Introduction
  • 4. ❑ What is data leakage? ❑Tahboub and Saleh (2014) ❑Noted that Data leakage is ❑Authorized and uncontrolled ❑Transmission of classified information ❑Impact of data leakage ❑ Davis (2019) noted that ❑Data leakage leads to financial loss ❑Damaged reputation ❑Legal ramification ❑ Data leakage prevention ❑DLP addresses protection of data ❑DLP technologies focus on sensitive data Literature Review
  • 5. ⮚Yoshihama et al. (2010) noted ⮚The essence of fine-grained analysis ⮚ DLP techniques ⮚Raman et al. (2011) noted ⮚That data encryption is necessary ⮚DLP analysis notes the ⮚Detection and prevention methods ⮚ New approaches to DLP ⮚MISTRAL (2018) noted ⮚The essence of Data-in-motion ⮚ and Data-at-Rest DLP Literature Review…Cont’d
  • 6. ❖ The research selected ❖The Agile SDLC model ❖The model supports ❖Customization of the process ❖ Concept ❖Denotes the objective of ❖The program ❖ Requirements ❖Covers teams, initial support and fund ❖ Design and Development ❖Covers organizational understanding ❖Data understating and preparation ❖Modeling and evaluation Research Methodology
  • 7. ❑ Deployment ❑Everything is successful ❑And working ❑ Demonstration ❑Demonstrated as a ❑Sign of proof and ❑How effective it can ❑Help organization stop data leakages ❑And do proper analysis ❑ Evaluation ❑Observation and analysis ❑Done at this point ❑Feedbacks will be noted ❑In support of the implementation process Research Methodology…Cont’d
  • 8. ❑ The CRISP-DM model ❑Plays focal role ❑Data includes ❑Personally identifiable information ❑ Data preparation and modeling ❑Data is converted into raw data ❑Data is exported to TXT format ❑ Modeling was supported by ❑Supervised learning ❑Unsupervised learning ❑Reinforcement learning ❑ Encryption and Decryption ❑Symmetric and asymmetric keys ❑Would be used Project Design
  • 9. ❖Notable examples include ❖Data encryption standard ❖And triple DES ❖RSA cryptosystem was used as well ❖ NEW DLP Solution ❖The preventive approach ❖Was used ❖Classification of documents ❖Was applied in the learning phase ❖Detection process specified ❖Unknown, confidential ❖And non-confidential data ❖Encryptions utilized RSA and AES ❖The solution quickly ❖Detects damage and encrypts data ❖Both damaged and undamaged Project Design…Cont’d
  • 11. ❖ New DLP solution ❖Is grounded on two aspects ❖Data leakage analysis ❖And Data leakage prevention ❖ Data analysis ❖Understands what is be protected ❖ DLP ❖Protects and classifies documents ❖Cryptography is also addressed ❖At this point ❖DRSM and CRISP-DM were ❖Deployed as data mining tools Results and Analysis
  • 12. ❖ Learning/Training phase ❖The system need to learn ❖Or trained to identify unknown ❖Confidential and non-confidential ❖ Algorithms ❖AES and RSA were necessary ❖The hybrid format of the keys ❖Ensures reliable protection ❖ Strength and weaknesses ❖It can do both analysis and protection ❖But cannot handle huge data Results and Analysis…Cont’d
  • 13. ❑ The research focused on ❑DLP analysis and development ❑Of the new DLP solution ❑ Pre-study ❑Explored on DLP ❑ and the available technologies ❑ Methodology ❑Utilized the agile SDLC approach ❑ The developed system ❑Is multi-functional ❑But cannot handle huge files ❑ Recommendations ❑The system need ❑To be customized to meet ❑Different needs and conditions Conclusion
  • 14. � Davis, M. (2019). 4 Damaging After-Effects of a Data Breach. Available at. https://www.cybintsolutions.com/4-damaging-after-effects-of-a-data- breach/ � MISTRAL. 2018. The two distinct approaches to data loss prevention. Available at. https://www.mistralsolutions.com/articles/two-distinct- approaches-data-loss-prevention/ � Tahboub, R. and Saleh, Y., 2014, January. Data leakage/loss prevention systems (DLP). In 2014 World Congress on Computer Applications and Information Systems (WCCAIS) (pp. 1- 6). IEEE. � Yoshihama, S., Mishina, T. and Matsumoto, T., 2010. Web-Based Data Leakage Prevention. In IWSEC (Short Papers) (pp. 78-93). References
  • 15. Contact us now Website: https://www.dissertationhomework.com Contact Number: +44 7842798340 THANK YOU !! Connect Now