SlideShare a Scribd company logo
1 of 29
Download to read offline
Data Leakage Detection
Submitted by:
Name: GauravKumar
Sic:15cs0967
Branch: CSE
Mob.No 9572343425
Contents…..
 Introduction
 How data leakage takes place
 Biggest data breaches of the 21st century
 Existing data leakage detection techniques
 Disadvantages of existing techniques
 Future scope
 Applications
 Conclusion
Introduction…..
DATA LEAKAGE is the unauthorized transmission of sensitive data or
information from within an organization to an external destination or
recipient.
SENSITIVE DATA of companies and organization includes
 intellectual property,
 Financial information,
 Patient information,
 Personal credit card data,
and other information depending upon the business and the industry
How data leakage takes place..??
 In the course of doing business, sometimes data must be handed
over to the trusted third parties for some enhancement or
operations.
 Sometimes these trusted third parties may act as points of data
leakage.
 Examples:
A. A hospital may give patient records to researcher who will devise
new treatments.
B. A company may have partnership with other companies that
require sharing of customer data.
C. An enterprise may outsource its data processing, so data must be
given to various other companies.
 Owner of data is termed as the distributor and the third
parties are called as the agents.
 In case of data leakage, the distributor must access the
likelihood that the leaked data come from one or more agents,
as opposed to having been independently gathered by other
means.
Biggest data breaches of the 21st century
1. Yahoo
Date: September 2016
Impact: 3 billion user accounts
Details: In September 2016, the once dominant Internet
giant, while in negotiations to sell itself to Verizon,
announced it had been the victim of the biggest data breach
in history, likely by “a state-sponsored actor,” in 2014. The
attack compromised the real names, email addresses, dates
of birth and telephone numbers of 500 million users. The
company said the "vast majority" of the passwords involved
had been hashed using the robust bcrypt algorithm.
2. eBay
Date: May 2014
Impact: 145 million users compromised
Details: The online auction giant reported a cyberattack in
May 2014 that it said exposed names, addresses, dates of
birth and encrypted passwords of all of its 145 million users.
The company said hackers got into the company network
using the credentials of three corporate employees, and had
complete inside access for 229 days, during which time they
were able to make their way to the user database.
3. Uber
Date: Late 2016
Impact: Personal information of 57 million Uber users and 600,000
drivers exposed.
4. Election Systems & Software – 1.8 million accounts
In August, IT security experts discovered an open Amazon Web
Services (AWS) cloud container. It contained a backup copy of data
from Election Systems & Software (ES&S), a company that
manufactures voting machines and elections management
systems. The data contained a total of almost 2 million accounts
with names, addresses, dates of birth, and party affiliations of
Illinois residents. By default, access to AWS bins is possible only
after authentication; however, for some unknown reason, the
settings on this device were misconfigured, and that made the
container accessible to the public.
 "We have a responsibility to protect your data, and if
we can't then we don't deserve to serve you,"
Zuckerberg said in a statement on his Facebook page.
Over 50 million Facebook profiles were harvested by an
app for data, which was then passed the information on
to Cambridge Analytica.
DATA LEAKAGE DETECTION
 To detect whether data been leaked by agents.
 To prevent data leakage.
Existing data leakage detection techniques
1. Watermarking
2. Steganography
1.Watermarking:
A unique code is embedded in each distributed copy. If
that copy is later discovered in the hands of an
unauthorized party, the leaker can be identified. The
watermark is difficult for an attacker to remove, even
when several individuals conspire together with
independently watermarked copies of the data.
HISTORY:
The term “water-marking” was coined by Andrew Tirkel and Charles Osborne
in December 1992. And the first successful embedding and extraction of it
was demonstrated in 1993 by Andrew Tirkel, Charles Osborne and Gerard
Rankin.
General water-marking procedure
Water-marking program
% Water Marking
clear all; close all
x=double(imread('greens.jpg'));
figure; imshow(x/255);
y=x
a=zeros(300,500);
a(100:250,100:350)=1
figure; imshow(a);
save m.dat a -ascii
x1=x(:,:,1);
x2=x(:,:,2);
x3=x(:,:,3);
dx1=dct2(x1); dx11=dx1; //discrete cosine transform
dx2=dct2(x2); dx22=dx2;
dx3=dct2(x3); dx33=dx3;
load m.dat
g=10; // to decide water-marking limit
[rm,cm]=size(m);
dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m;
dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m;
dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m;
figure,imshow(dx1);
figure,imshow(dx2);
figure,imshow(dx3);
y1=idct2(dx1);
y2=idct2(dx2);
y2=idct2(dx3);
y(:,:,1)=y1;
y(:,:,2)=y2;
y(:,:,3)=y3;
figure,imshow(y1);
figure,imshow(y2);
figure,imshow(y3);
figure;imshow(y/255);
Image before & after water-marking
DRAWBACKS OF WATERMARKING
 It involves some modification of data that is making the
data less sensitive by altering attributes of the data.
 The second problem is that these watermarks can be
sometimes destroyed, if the recipient is malicious.
2.Steganography:
Steganography is a technique for hiding a secret message
within a larger one in such a way that others can’t discern
the presence or contents of the hidden message.
Future scope
 Future work includes the investigation of agent guilt
models that capture the leakage scenarios that are not
yet considered.
 The extension of data allocation strategies so that they
can handle agent requests in an online fashion.
APPLICATIONS OF DATA LEAKAGEDETECTION
 It helps in detecting whether the distributor’s sensitive
data has been leaked by the trustworthy or authorized
agents.
 It helps to identify the agents who leaked the data.
 Reduce cybercrime.
 Copy prevention & control.
 Source tracking.
Conclusion
 In the real scenario there is no need to hand over the
sensitive data to the agents who will unknowingly or
maliciously leak it.
 However, in many cases, we must indeed work with
agents that may not be 100 percent trusted, and we
may not be certain if a leaked object came from an
agent or from some other source.
 We can provide security to our data during its
distribution or transmission and even we can detect if
that gets leaked by using data leakage detection
techniques.
Submitted by:
Name: GAURAV KUMAR
Branch: CSE
Email-id:-
Gaurav.kumar8462@gmail.com

More Related Content

Similar to Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf

Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingIRJET Journal
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1Sohail Gohir
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionkalpesh1908
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedStuart Clarke
 
Source Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperSource Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperDigital Shadows
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityShakas Technologies
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Energy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesEnergy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesDigital Shadows
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackSusan Kennedy
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 

Similar to Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf (20)

Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
 
Source Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperSource Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by Developer
 
AIDA ICITET
AIDA ICITETAIDA ICITET
AIDA ICITET
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Energy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesEnergy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False Positives
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 
Sub1555
Sub1555Sub1555
Sub1555
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 

Recently uploaded

Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)jennyeacort
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...Suhani Kapoor
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Roomdivyansh0kumar0
 
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
PORTAFOLIO   2024_  ANASTASIYA  KUDINOVAPORTAFOLIO   2024_  ANASTASIYA  KUDINOVA
PORTAFOLIO 2024_ ANASTASIYA KUDINOVAAnastasiya Kudinova
 
Cosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable BricksCosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable Bricksabhishekparmar618
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Delhi Call girls
 
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...ankitnayak356677
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...Suhani Kapoor
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightCheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightDelhi Call girls
 
How to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our SiteHow to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our Sitegalleryaagency
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...Pooja Nehwal
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Narsimha murthy
 

Recently uploaded (20)

Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
 
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
PORTAFOLIO   2024_  ANASTASIYA  KUDINOVAPORTAFOLIO   2024_  ANASTASIYA  KUDINOVA
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
 
Cosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable BricksCosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable Bricks
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
 
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
 
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
 
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightCheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
 
How to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our SiteHow to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our Site
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
 
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
 

Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf

  • 1. Data Leakage Detection Submitted by: Name: GauravKumar Sic:15cs0967 Branch: CSE Mob.No 9572343425
  • 2. Contents…..  Introduction  How data leakage takes place  Biggest data breaches of the 21st century  Existing data leakage detection techniques  Disadvantages of existing techniques  Future scope  Applications  Conclusion
  • 3. Introduction….. DATA LEAKAGE is the unauthorized transmission of sensitive data or information from within an organization to an external destination or recipient. SENSITIVE DATA of companies and organization includes  intellectual property,  Financial information,  Patient information,  Personal credit card data, and other information depending upon the business and the industry
  • 4. How data leakage takes place..??  In the course of doing business, sometimes data must be handed over to the trusted third parties for some enhancement or operations.  Sometimes these trusted third parties may act as points of data leakage.  Examples: A. A hospital may give patient records to researcher who will devise new treatments. B. A company may have partnership with other companies that require sharing of customer data. C. An enterprise may outsource its data processing, so data must be given to various other companies.
  • 5.  Owner of data is termed as the distributor and the third parties are called as the agents.  In case of data leakage, the distributor must access the likelihood that the leaked data come from one or more agents, as opposed to having been independently gathered by other means.
  • 6. Biggest data breaches of the 21st century
  • 7. 1. Yahoo Date: September 2016 Impact: 3 billion user accounts Details: In September 2016, the once dominant Internet giant, while in negotiations to sell itself to Verizon, announced it had been the victim of the biggest data breach in history, likely by “a state-sponsored actor,” in 2014. The attack compromised the real names, email addresses, dates of birth and telephone numbers of 500 million users. The company said the "vast majority" of the passwords involved had been hashed using the robust bcrypt algorithm.
  • 8. 2. eBay Date: May 2014 Impact: 145 million users compromised Details: The online auction giant reported a cyberattack in May 2014 that it said exposed names, addresses, dates of birth and encrypted passwords of all of its 145 million users. The company said hackers got into the company network using the credentials of three corporate employees, and had complete inside access for 229 days, during which time they were able to make their way to the user database.
  • 9. 3. Uber Date: Late 2016 Impact: Personal information of 57 million Uber users and 600,000 drivers exposed. 4. Election Systems & Software – 1.8 million accounts In August, IT security experts discovered an open Amazon Web Services (AWS) cloud container. It contained a backup copy of data from Election Systems & Software (ES&S), a company that manufactures voting machines and elections management systems. The data contained a total of almost 2 million accounts with names, addresses, dates of birth, and party affiliations of Illinois residents. By default, access to AWS bins is possible only after authentication; however, for some unknown reason, the settings on this device were misconfigured, and that made the container accessible to the public.
  • 10.  "We have a responsibility to protect your data, and if we can't then we don't deserve to serve you," Zuckerberg said in a statement on his Facebook page. Over 50 million Facebook profiles were harvested by an app for data, which was then passed the information on to Cambridge Analytica.
  • 11.
  • 12.
  • 13.
  • 14. DATA LEAKAGE DETECTION  To detect whether data been leaked by agents.  To prevent data leakage.
  • 15. Existing data leakage detection techniques 1. Watermarking 2. Steganography
  • 16. 1.Watermarking: A unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified. The watermark is difficult for an attacker to remove, even when several individuals conspire together with independently watermarked copies of the data. HISTORY: The term “water-marking” was coined by Andrew Tirkel and Charles Osborne in December 1992. And the first successful embedding and extraction of it was demonstrated in 1993 by Andrew Tirkel, Charles Osborne and Gerard Rankin.
  • 18.
  • 19. Water-marking program % Water Marking clear all; close all x=double(imread('greens.jpg')); figure; imshow(x/255); y=x a=zeros(300,500); a(100:250,100:350)=1 figure; imshow(a); save m.dat a -ascii x1=x(:,:,1); x2=x(:,:,2); x3=x(:,:,3);
  • 20. dx1=dct2(x1); dx11=dx1; //discrete cosine transform dx2=dct2(x2); dx22=dx2; dx3=dct2(x3); dx33=dx3; load m.dat g=10; // to decide water-marking limit [rm,cm]=size(m); dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m; dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m; dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m; figure,imshow(dx1); figure,imshow(dx2); figure,imshow(dx3);
  • 22. Image before & after water-marking
  • 23. DRAWBACKS OF WATERMARKING  It involves some modification of data that is making the data less sensitive by altering attributes of the data.  The second problem is that these watermarks can be sometimes destroyed, if the recipient is malicious.
  • 24. 2.Steganography: Steganography is a technique for hiding a secret message within a larger one in such a way that others can’t discern the presence or contents of the hidden message.
  • 25. Future scope  Future work includes the investigation of agent guilt models that capture the leakage scenarios that are not yet considered.  The extension of data allocation strategies so that they can handle agent requests in an online fashion.
  • 26.
  • 27. APPLICATIONS OF DATA LEAKAGEDETECTION  It helps in detecting whether the distributor’s sensitive data has been leaked by the trustworthy or authorized agents.  It helps to identify the agents who leaked the data.  Reduce cybercrime.  Copy prevention & control.  Source tracking.
  • 28. Conclusion  In the real scenario there is no need to hand over the sensitive data to the agents who will unknowingly or maliciously leak it.  However, in many cases, we must indeed work with agents that may not be 100 percent trusted, and we may not be certain if a leaked object came from an agent or from some other source.  We can provide security to our data during its distribution or transmission and even we can detect if that gets leaked by using data leakage detection techniques.
  • 29. Submitted by: Name: GAURAV KUMAR Branch: CSE Email-id:- Gaurav.kumar8462@gmail.com