SlideShare a Scribd company logo
Information/Data leakage
Emil Hermansson
Definition

 Information leakage is when a system designed to be
closed for outsiders reveals information to unauthorized
parties
 It is very common that there is some amount of
information leakage, even though the leakage may be
harmless. There might be a leakage that you are
sending a message, but no information about the
message or to whom you are sending it
Special elements in this threat

 There are hackers (crackers is another name used) who
seeks and exploits weaknesses in networks
 Some information might also be leaked unintentionally
by mistake
 Information about a companys customers or their
personal information is something that might leak and
harm the company
Examples

 WikiLeaks is an example of a site that provides all sorts
of information leakage. It might not be from the social
media so much and the main source of the leakages are
whistleblowers.
 Google accidentally leaked information about their
earnings too early, costing the company USD22 Billion

 All users of social media that do not protect their privacy
sets themselves prone for identity theft
How to prevent the threats
 DLP stands for Data Loss Prevention.
 There are many companies providing softwares and
services to help companies prevent information leakage
 All major antivirus companies offer DLP services
 There are three different levels of DLP:
- Standard security measures that include firewalls and
antivirus software
- Advanced security measures that include detecting of
abnormal activities and employ machine learning
- Designated DLP solutions that include all intentional
and unintentional unauthorized sending or copying of
sensitive data
Sources

 http://www.networkworld.com/research/2008/010708data-leak-nightmares.html
 http://nakedsecurity.sophos.com/2012/10/19/data-leakgoogle-stock/
 http://en.wikipedia.org/wiki/Data_loss_prevention_softw
are
 http://wikileaks.org/About.html
 http://en.wikipedia.org/wiki/Information_leakage

More Related Content

What's hot

Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
Paul Melson
 

What's hot (19)

Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Primeshare overview -_jun_2013-1
Primeshare overview -_jun_2013-1Primeshare overview -_jun_2013-1
Primeshare overview -_jun_2013-1
 
Storage Made Easy Cloud Control Gateway Overview
Storage Made Easy Cloud Control Gateway OverviewStorage Made Easy Cloud Control Gateway Overview
Storage Made Easy Cloud Control Gateway Overview
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
 
Fintech Belgium - MeeUp on The ideal RegTech partner of banks and FinTechs - ...
Fintech Belgium - MeeUp on The ideal RegTech partner of banks and FinTechs - ...Fintech Belgium - MeeUp on The ideal RegTech partner of banks and FinTechs - ...
Fintech Belgium - MeeUp on The ideal RegTech partner of banks and FinTechs - ...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's world
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
Information Security: quali aree di investimento?
Information Security: quali aree di investimento? Information Security: quali aree di investimento?
Information Security: quali aree di investimento?
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
Social media and security
Social media and securitySocial media and security
Social media and security
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
IT Security Summit 2016
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 

Viewers also liked

Personal information
Personal informationPersonal information
Personal information
HHSome
 
06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem
andywestphal3
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
jdrinks
 
Introduction to plants
Introduction to plantsIntroduction to plants
Introduction to plants
jdrinks
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
Rosalyn Alleman
 
Social engineering
Social engineeringSocial engineering
Social engineering
HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)
Strobillus Found
 
Scientific method & variables
Scientific method & variablesScientific method & variables
Scientific method & variables
jdrinks
 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
jdrinks
 

Viewers also liked (20)

Goals of vocabulary learning
Goals of vocabulary learning Goals of vocabulary learning
Goals of vocabulary learning
 
Malware
MalwareMalware
Malware
 
Personal information
Personal informationPersonal information
Personal information
 
Karmax itinerary(1)
Karmax itinerary(1)Karmax itinerary(1)
Karmax itinerary(1)
 
06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Introduction to plants
Introduction to plantsIntroduction to plants
Introduction to plants
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
 
Fungi
FungiFungi
Fungi
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
State of Rural Minnesota 2013-full report
State of Rural Minnesota 2013-full reportState of Rural Minnesota 2013-full report
State of Rural Minnesota 2013-full report
 
American Karma
American KarmaAmerican Karma
American Karma
 
Present perfect continuous
Present perfect continuousPresent perfect continuous
Present perfect continuous
 
12test
12test12test
12test
 
Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)
 
Scientific method & variables
Scientific method & variablesScientific method & variables
Scientific method & variables
 
Replacement roofing
Replacement roofingReplacement roofing
Replacement roofing
 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
 
Finding the Voice of Rural Minnesota
Finding the Voice of Rural MinnesotaFinding the Voice of Rural Minnesota
Finding the Voice of Rural Minnesota
 

Similar to Assignment4

Similar to Assignment4 (20)

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf Security
 
Information security
Information securityInformation security
Information security
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Office_Cypersecurity_Basic_Training_Decmeber2022.pptx
Office_Cypersecurity_Basic_Training_Decmeber2022.pptxOffice_Cypersecurity_Basic_Training_Decmeber2022.pptx
Office_Cypersecurity_Basic_Training_Decmeber2022.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Threats
ThreatsThreats
Threats
 
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
 
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

More from HHSome (15)

Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Recently uploaded

Grow Your Instagram Profile Organically A Guide to Real Engagement.pdf
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdfGrow Your Instagram Profile Organically A Guide to Real Engagement.pdf
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdf
SocioCosmos
 
How to blow up on social media simple di
How to blow up on social media simple diHow to blow up on social media simple di
How to blow up on social media simple di
RachaelOnuche
 

Recently uploaded (11)

Top 10 Best Motivational Movies Of Bollywood
Top 10 Best Motivational Movies Of BollywoodTop 10 Best Motivational Movies Of Bollywood
Top 10 Best Motivational Movies Of Bollywood
 
Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
 
Experience genuine and sustainable growth on TikTok.
Experience genuine and sustainable growth on TikTok.Experience genuine and sustainable growth on TikTok.
Experience genuine and sustainable growth on TikTok.
 
Looking to Drive Traffic from Pinterest?
Looking to Drive Traffic from Pinterest?Looking to Drive Traffic from Pinterest?
Looking to Drive Traffic from Pinterest?
 
Children's Data Privacy_April-22_2024.pdf
Children's Data Privacy_April-22_2024.pdfChildren's Data Privacy_April-22_2024.pdf
Children's Data Privacy_April-22_2024.pdf
 
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdf
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdfGrow Your Instagram Profile Organically A Guide to Real Engagement.pdf
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdf
 
How to blow up on social media simple di
How to blow up on social media simple diHow to blow up on social media simple di
How to blow up on social media simple di
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
 
Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
 
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
 

Assignment4

  • 2. Definition  Information leakage is when a system designed to be closed for outsiders reveals information to unauthorized parties  It is very common that there is some amount of information leakage, even though the leakage may be harmless. There might be a leakage that you are sending a message, but no information about the message or to whom you are sending it
  • 3. Special elements in this threat  There are hackers (crackers is another name used) who seeks and exploits weaknesses in networks  Some information might also be leaked unintentionally by mistake  Information about a companys customers or their personal information is something that might leak and harm the company
  • 4. Examples  WikiLeaks is an example of a site that provides all sorts of information leakage. It might not be from the social media so much and the main source of the leakages are whistleblowers.  Google accidentally leaked information about their earnings too early, costing the company USD22 Billion  All users of social media that do not protect their privacy sets themselves prone for identity theft
  • 5. How to prevent the threats  DLP stands for Data Loss Prevention.  There are many companies providing softwares and services to help companies prevent information leakage  All major antivirus companies offer DLP services  There are three different levels of DLP: - Standard security measures that include firewalls and antivirus software - Advanced security measures that include detecting of abnormal activities and employ machine learning - Designated DLP solutions that include all intentional and unintentional unauthorized sending or copying of sensitive data
  • 6. Sources  http://www.networkworld.com/research/2008/010708data-leak-nightmares.html  http://nakedsecurity.sophos.com/2012/10/19/data-leakgoogle-stock/  http://en.wikipedia.org/wiki/Data_loss_prevention_softw are  http://wikileaks.org/About.html  http://en.wikipedia.org/wiki/Information_leakage