SlideShare a Scribd company logo
1 of 10
Download to read offline
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

Protection and Defense against Sensitive Data Leakage Problem
within Organizations
1-Sahem A. Nawafleh
E-business & E-commerce department - University Of Petra
2-Muneer Y. F. Hasan
Management information system department - University Of Petra
3-Yousef Nawafleh
The Jordanian Ministry of Justice
4-Suha Amin A. Rahman Fakhouri
AL-Ghad international medicl science colleges
Abstract
Information security has never been as important as it is today for the business, health, and educational organizations,
in addition to individuals because many organizations around the world depend, today, on reliable information to
perform their daily tasks. Additionally, the information needs to be timely, accurate, complete, valid, consistent and
relevant to
any use on the organization. The information, confidentiality, is measured as a main topic for many
organizations around the world that attempt to find the best way to protect them from hackers' attacks, so it is possible
for organizations and individuals to protect themselves by being skilled on the importance of security and gaining
awareness of the possible security attacks that they may encounter. This paper proposed an integrated solution for
preventing and reducing intentional sensitive data leakage actions through implementing a series of effective
procedures, for instance: monitoring user’s actions, protecting sensitive data properly against any intentional or
accidental leaks, and guarantee these data not to be reached to the wrong individuals or groups from inside/outside
the organization. The proposed sensitive Data Leakage Prevention (DLP) solution involves identification, monitoring,
and protecting three groups of significant organization's data: data at rest, data in use, and data in motion.
Index Terms : Sensitive data, Data Leakage,
Data Leakage Prevention (DLP) solution,
Acceptable Use of Information (AUI),
Data in use, Data at rest, Data in motion.
1.

Introduction

Nowadays, Information Security became a vital and a major subject especially with the spreading of information
sharing among private and public networks for all organizations across different industrial sectors e.g. telecom,
banking and education all over the world. The importance of securing information is playing a significant role
especially when sharing, distributing, accessing and publishing any information that's been classified as a
sensitive either for the organization itself or the clients whom sharing their private information with the
organization, like information that has been stored, shared, distributed and viewed through the electronic
document systems and/or images of paper document systems which is widely used by a lot of organizations.
Many organizations have a great deal of attention that has been given to protect their sensitive data from outside
threats by using a set of security countermeasures like: intrusion prevention systems, firewalls, and management
of thevulnerable points inside them. So, organizations must now turn their attention to equal critical situations
that forms, for them, as a big challenge today’s: the problem of data leaking or loss from the inside.
In fact, in many organizations, there is a gap in controlling, monitoring, and protecting its business environment
and electronic data assets from leakage or loss to the wrong individuals or groups intentionally or accidentally.
This gap is now ubiquitous in businesses, health, educational organizations and individuals who are needed to
communicate with each other over the Internet networks. In our days, many electronic communications which
are used heavily inside any organization for many purposes ,for instance: local mail, instant messaging, web mail,
transferring data files , and also organization's website, are still used largely in different destinations without any
limitations, monitoring , and controlling for its movements from the organization, thus the expected result for
this issue that there is a huge potential confidential information of the organization to surely fall into the wrong
hands. From this significant point, this organization's sensitive data should be protected very well or will be
faced with tragedy results like: business loss, reputation damage, bad publicity, strategic customer loss, and loss
87
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

of the competitor with other organizations. As a result, any organization that uses a similar electronic document
system must keep a close eye for securing sensitive information that is going forth/back through this system or
the application to maintain business continuity and reputation and to ensure regulations, law compliance along
with differentiating from others.
In this paper we talk about one of the most new methodologies and techniques solution that has been raised to
the top is the Data Leakage Prevention (DLP) solution which is basically protecting sensitive data of an
organization from being viewed by wrong individuals, being from outside the organization, or even from inside
it. This basically means that specific data can be viewed by only a specific set of an authorized individuals or
groups [3]. The sensitive Data leakage prevention (DLP) became one of the most critical issues that faces Chief
Information Officers (CIOs), Chief Security Officers (CSOs), and Chief Information Security Officers (CISOs).
On the other hand, the DLP's solution is considered as one of the most vital security approaches and techniques
that effectively assist organizations today in protecting the organization's sensitive data from leaking into the
wrong hands. It's playing a major role as a part of the overall information security system framework that can
integrate with existing infrastructure and systems like electronic document management systems to provide a
comprehensive , holistic and effective information security strategy inside the organization [5].
2.

Background

Many published papers and reports talk about the importance of (1) identification of sensitive data in any
organization, (2) applying a suitable information policy to protect it from leakage into the wrong hands, (3)
finally explain the benefits that any organization can gain from preventing data leakage and prove this issue that
can be satisfied by controlling and monitoring the document viewer side. Eric Maiwald thinks that the
identification of information policy within any organization is considered as the most important part according to
many justifications like [1]:
(i) The information policy defines what sensitive data is within the organization and that data should be
protected. This policy should be constructed to cover all data within the organization.
(ii) Each employee is responsible for protecting sensitive data that comes into the employee's
possession.
These data can be in the form of electronic documents or paper records, thus the organization's policy must take
both into account.
(iii) To protect your data from leakage you must classify the data documents into a set of levels according to
their importance like:
1- Public Classification (lowest level):
The data are not sensitive and can be provided to the public.
2- Private Classification (Medium level):
The data are confidential and can be provided only to the authorized employees or to other
organizations.
3- Sensitive Data Classification (Highes level):
The data are very sensitive and must be restricted to a limited number of employees within the
organization. These data must be protected well by not provided to all employees or to the individuals
outside of the organization.
(iv) The information policy must address how sensitive data is transmitted. The sensitive data can be
transmitted through a number of ways such as (Email, Fax, and so on), and the policy should address each
of them very well.
Securosis -information security company- report which published on Feb/2009 described the
(A)
Main features of Data
Leakage Prevention (DLP) life cycle, where all these
(B)
features are tied together in the DLP cycle as the following [7]:

88
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

Fig1: DLP Features Cycle [7]

1. Define: The first feature which concerns with building a proper organization information policy that
defines the data to be protected, and how to protect it very well.
2. Discover: The second feature which uses the DLP solution to find the definition data throughout the
organization. And then relocate or remove information where it shouldn’t be.
3. Monitor: The third feature which concerns in track usage of the defined data at risk, in motion, and in use.
Then it can generate a proper warning alert if and only if any organization's Information policy had been
violated.
4. Protect: The fourth feature which concerns with protecting sensitive data from leaking by quarantine emails,
relocate files, block copies to portable storage, and other enforcement actions.
(B) Define Data Leakage Prevention concept as
"Products that, based on central policies, identify, monitor,
and protect data at risk, in
motion, and in use through deep content
analysis". This definition contains
the core
components of a DLP solution: centralized
management, identification of defined data,
monitoring of usage, and protection from
policy violations. A DLP solution can do
this in data storage,
on networks, and on
employees' computers, using advanced
analysis techniques, thus this solution can
provide better protection and more cost
effective in the long term.
(C) They expected more benefits that can be gained from implementing a proper DLP solution within any
organization like the following [7]:
 Risk Reduction: You can reduce the risk of threats and the possibility of data leakage by knowing where
your data is stored and how it’s being used.
 Cost Savings: DLP solution may help to reduce other costs associated with data management and security.
 Compliance support: DLP solution helps to reduce the direct costs associated with some regulatory compliance
from all employees within the organization.
 Policy enforcement: Many data management policies in different organizations are difficult or impossible to
enforce. The DLP solution supports enforcement of Acceptable Use of Information (AUI), not just security
controls.
 Data security and Threat management:
While no security tool stops all threats, DLP solution reduces the risk of certain malicious activity.
on March 2008, many of specialized corporations such as International Data Corporation (IDC), which is a
leading center in the world of information security researches' and analysis specifically for many sectors such as:
89
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

information technology, and telecommunications. Its report which was published to demonstrate the dangers of
accidental exposure for organization's sensitive data and considered it as the number one threat. [8].
At the end of the same year, another study for the same corporation has shown many important facts like: 80
percent of respondents in the survey have agreed on that data security was one of the biggest challenges facing
them, and with 50 percent of respondents have possessed a good experience to deal with incidents of leakage of
sensitive data inside different sectors of the organization. [9]
Another important IDC’s survey indicated that the problem of intellectual property has now become one of the
most acute problems that faces many organizations today, especially for the sensitive data leakage problem. 81
percent of those surveyed saw that Information Protection and Control (IPC) – can definitely be considered, as
monitoring, encrypting, filtering, and blocking sensitive data contained in data at risk, data in motion, and data in
use, as an important part of the overall strategy to protect the data within the organization.
The highest priority of information protection and control (IPC) solution was data leakage prevention (DLP)
which deployed at the organization’s perimeter and on all endpoint computers within the organization. [8]

Fig2: Importance of monitoring employee use [8]

The respondents to IDC’s survey demonstrated the importance of [monitoring employee use] and showed that
the accidental or intentional exposure of confidential information of the organization, is ranging from legally
protected personal information to intellectual property and any significant secrets about organization, is
something that affects on the IT environment in its widest sense, involving lost or stolen laptops, hacking
employees' emails and any other vital applications for them. Nowadays, the main challenge for many
organizations is not how to find the best way to protect the sensitive data from the threat or corruption of
malware programs , but just how it can add a proper second security layer that can prevent data that's being
accessed if it is lost.
A Sophos white paper which published on Feb/2009 under the title “Stopping Data Leakage” demonstrated the
importance of enabling DLP solution within the organization by creating and enforcing an Acceptable Use Policy
(AUP) to support any attempts to stop data leaking from the organization. It also proposed three steps to make an
AUP success [5]:
Step (1): Create the suitable policy within the organization.
Step (2): Educate employees and users about the policy.
Step (3): Enforce the policy properly.
The AUP should cover many issues that are very important for the employees within the organization to be
known for them clearly such as [5]:
i. Determine clearly what information or documents must not be emailed.
ii. Determine whose persons or organizations are authorized to access, receive, and see the sensitive data
documents.
iii. Determine what operations/actions are allowed on the sensitive data documents.
90
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

iv. The organizational policy in sending a specific document over the web or downloading it from the web.
v. The organizational policy on storing sensitive data on desktops, PC’s, laptops, and so on.
3.

Main Work

Nowadays, many business organizations have become vastly depending on online transactions; to complete its
works efficiently and accurately, thus saving time and cost for them. This option makes a big chance for
transferring data between many nodes within the organization in a more flexible way, but at the same time it
faces many challenges and limitations for instance finds the best way for monitoring, keeping, and preventing
data from leakage to unauthorized people. Many organizations over the world find themselves, after years of
enforcing viruses, intrusions, and email spam problems, facing a significant new security issue but it becomes
more important in huge data leakage. Therefore, different organizations sectors today (e.g. Health, telecom,
banking, and education) are becoming increasingly more aware of the acute need to control, very well, the
information that flows into, through and out of their own networks.
One of these solutions is a DLP Solution which is considered as the best solution that can be used by the
organizations and vendors who are offering services or products to prevent
Sensitive data from reaching to
unauthorized
persons and others [4]. The most important
part in any DLP solution involves developing
awareness training courses for the users to achieve data leakage prevention through teaching them how to deal
with
expected security attacks that can happen for them at any moment. However, this solution does not
guarantee a complete protection as data leakage may occur intentionally by leaking data or accidentally by
sending data to wrong receivers.
The main contribution of this paper is describing a new security solution [DLP Solution] which can be used
effectively in reducing intentional sensitive data leakage actions through monitoring user’s actions properly.
On the other hand, this solution can be regarded as “integrated” if and only if it is able to:
• Protecting the organization's sensitive data against any accidental or intentional leakage.
• Securing the organization's sensitive data so that, if it leaked or lost, it cannot easily be read by others.
4.

The Process of Identifying
Sensitive Data

Sensitive data is any data that when it leaks, it can cause harm to somebody or an organization.
Sensitive data may contain:
1- Personal Information
2- Information about the organization.
There are various examples of sensitive data:










Social Security number (SSN).
Credit card number.
Personal information about patients.
Financial data of the organization.
Personal information about students.
Students’ records (study plans, marks).
Employees personal information.
Research data within the university.
University special Legal data.

5.

The Process of Identifying Sensitive
Data Leakage Prevention (DLP) Solution
Data Leakage Prevention (DLP) is a computer security term that involves the identification, monitoring,
91
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

and protecting three groups of organizing data [7]:
6.

Data at Risk

“Data at Risk” is a recorded and stored data in media storage or any data that resides in filing systems, databases
and other storage methods [3, 6]. This data can be regarded as “Secure” if and only if:
• The data is protected by strong encryption (where “strong encryption” is defined as “encryption requiring a
computationally infeasible amount of time to brute force attack”).
• The key (required to decrypt the data) is (i) not presenting to the media itself (ii) not present on the node
associated with the media; and (iii) is of sufficient length and randomness to be functionally immune to a
dictionary attack.
7.

Data in Use

• “Data in Use” is all data that is not at risk state, and only on one particular node in a network (for example,
in resident memory, swap, processor cache or disk cache, or memory) [3, 6]. This data can be regarded as
“Secure” if and only If:
• The Access to the memory is thoroughly controlled (the process that accessed the storage media data and
read it into memory is the only process that has an access to the memory.
• Regardless of how the process (the owner of the data) terminates, (either by successful completion, killing
the process, or shutting down the computer), the data cannot be retrieved from any location other than the
original at risk state, requiring re-authorization.
8.

Data in Motion

• Or “Data in Transit” is all data being transferred between two nodes in a network [3, 6]. This data can be
regarded as “Secure” if and only if:
• Both nodes (the source and the receiver of the data) are capable of protecting the data in the previous two
classifications from any threats.
• The communication between the two hosts is identified, authenticated, authorized, and private; meaning
that no third node over the network can overhear the communication between the two endpoint nodes.
9.

Data Leakage Prevention (DLP) Techniques

Protecting those data groups is achieved through the following techniques that can be found in DLP literature
[ 6]:
• Deep content inspection (Advanced Option).
• Contextual security analysis of transaction (attributes of originator, data object, medium, timing, and
recipient/destination).
• A centralized management framework. The systems are designed to detect and prevent the unauthorized use
and transmission of confidential information.
10. How is Data Leakage Prevention (DLP) different from other security technologies?
Conventional security tools that have been in use, such as firewalls and An Intrusion detection system (IDS)
/Intrusion prevention system (IPS) look for anything that can form or pose a threat to the organization's
information and then obtain set of steps to deal with these threats. But Data leakage prevention (DLP) solution is
interested in identifying the sensitive data inside the organization and then the first option is monitoring the
users’ usage and the last option is preventing them from leakage to unauthorized organizations or people [3].

92
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

11. DLP Integrated Solution
The truth is that, most business organizations in the world across different sectors (governmental establishments,
ministries, specialized companies, banks, and universities), for example, don’t have enough technical staff,
governmental /special funds, resources, and they need for intensive efforts to implement suitable security
requirements within the sturdy strategy security plan to face the data leakage problem effectively.
Accordingly, an urgent need emerged for organizations to implement a series of new security solutions that
combine the features of a DLP solution with other security tools to provide an integrated solution to this problem
from its roots. Hence, this paper has proposed an integrated solution based on the achievement of two main
phases [Two Layers of Defense], which can be summarized as following:
Phase (1): (First layer of defense)
Protecting sensitive data of an organization
Endpoint protection (Protecting Data inside Organization): The proposed procedures to guarantee endpoint
nodes inside the organization are safely.
Table 1: Endpoint Protection Procedures
Prohibiting the use of non-necessary applications such
as wireless network connections, sharing files, FTP
clients, instant messaging service (IM), and
unauthorized email clients. Therefore, all employees
should be fully aware of the dangers of sending and
sharing organization’s data via these applications.
Blocking different spyware programs that can be used
effectively by information's hackers in hacking
sensitive data of an organization by using powerful
anti-malware solutions.
Checking carefully that every PC connected to network
within the organization is compatible with the
organization’s security policy.
Managing properly access operations to any type of
portable storage devices such as USB keys and others.
Consequently, these devices can cause a high security
risk within any organization, because they can be easily
lost.
Gateway protection (Protecting Data outside Organization): At present, many organizations have their own
websites and e-mail; these may contain a lot of security functions that can be used to prevent
sensitive/confidential data from being sent outside the organization or to un-authorized users within the
organization.These Features include:
Table 2: Gateway Protection Procedures
Monitoring and Controlling users from accessing particular
websites, well-known webmail sites (e.g. Yahoo! Mail and
Google email), and applications which can cause a serious
threat to the organization itself.
Preventing users from uploading or downloading certain
types of data files and warn them clearly from unauthorized
file types which are received in their emails.
Controlling and blocking the unauthorized use of Instant
Messaging (IM) and FTP traffic between the users
themselves or with other users/organizations from outside.

93
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

Adopting a series of preventive measures to protect against
“drive-by-downloads” feature’s which secretly place
specific spyware code on the user’s PC when they
accidentally visit a particular sabotage website.
Consequently, these tricks require from the users' within the
organization to be well aware the seriousness of these
threats if occurred.
Verifying the contents of web traffic periodically to ensure
it is free from any Viruses, spyware, and malware. On the
other hand, being confident that these programs will not be
downloaded into the user’s PC.
Scanning accurately the Contents of email messages and
attachments of various kinds to control and prevent
sensitive data from leakage by identifying a specific
keywords relating to confidential data of the organization.

Phase (2): (Second layer of defense)
Securing sensitive data of an organization
In fact, despite of having the best solutions for data leakage problem and the best policies for securing the
sensitive data of an organization, there still a possibility of leakage or loss at any moment in the wrong hands
intentionally or accidentally. So it is essential to have a second layer of defense [Encryption Sensitive Data].
Data encryption is considered as one of the traditional methods that have been used effectively for a long period
to protect data when moving from one place to another. Over the past years, many researchers and specialists in
information security agreed on that the percentage of the potential risk, for the organization itself or the users,
will be reduced if data had been encrypted very well compared with non-encrypted data. If the organization
wants to secure its sensitive data and devices, they should:
Table 3: Secure Data Procedures
Perform full disk encryption for PC’s,
laptops, and notebooks according to their
importance.
Encrypt sensitive data which are stored on
removable storage devices (e.g. USB drives,
CDs and DVDs).
Encrypt E-mail’s content to prevent
unauthorized users from reading them.
Encrypting sensitive data and devices, that is used in the organization, this way indicate that both are subsisted in
a safe mode, even if they reached the wrong hands. But the main question which must take into consideration;
whether if encrypting sensitive data only, is enough to protect it from any risk
12. Conclusion
Sensitive Data leakage prevention problem, become as one of the most vital security issues facing Organizations
today. The most effective solution to the problem is to see Data Leakage Prevention solution (DLP) as part of the
overall security problem. This solution can be integrated fully with other security tools within organization to
form a comprehensive security strategy plan to protect these data properly .DLP solution can be used effectively
in reducing intentional sensitive data leakage actions through monitoring user’s actions and protecting three
groups of organizing data: data at risk, data in use, and data in motion. This solution can be regarded as
“integrated” through the achievement of two main phases [two layers of defense]: protecting sensitive data and
securing sensitive data of an organization. The organization also needs to create an Acceptable Use Policy (AUP)
for users, at the same time ensuring both are compliant with organizational policies.
94
European Journal of Business and Management

www.iiste.org

ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.23, 2013

To avoid data leakage, organizations must evaluate their weakness and respond appropriately in many ways like:
Endpoints protection, Gateway protection, and encryption data.
13. References
[1] Eric Maiwald, “Fundamentals of Network Security”, McGraw-Hill November 2003.
[2] John M. Carrol, “Computer Security”, Third Edition Butterworth-Heinemann 1996.
[3] Prathaben Kanagasingham, “Data Loss Prevention” (Aug/2008), Retrieved November
14, 2009 from http://www.sans.org/reading_room/whitepapers/dlp/data_loss_prevention_32883.
[4] Sans Security Institute, “SANS What Works in Data Leakage Prevention & Encryption
Summit” (Jan/2010), Retrieved January 16, 2010 from http://www.sans.org/data-leakage-prevention2010.
[5] Sophos Institute, "Stopping data leakage: Making the most of your security budget", Published 19
November 2009, Retrieved January 18, 2010 from
http://viewer.bitpipe.com/viewer/viewDocument.do?accessId=11492295.
[6] Sans Security Institute and Securosis, "Understanding and Selecting A Data Loss Prevention Solution"
(2009), Retrieved January 24, 2010 from http://www.websense.com/site/Docs/whitepapers/en
/Understanding_and_selectinga_DLP_solution_wp. Pdf.
[7] Securosis Information Security Research and Analysis, "The Executive Guide to Dat Loss Prevention" (2009),
Retrieved January 24/ 2010 from http://www.websense.com/site/docs/whitepapers/en/Mogull_DLP_WP.pdf.
[8] IDC, “Information Protection and Control Survey: Data Loss Prevention and Encryption Trends”, Doc #
211109, March 2008, Last accessed August 24, 2010
[9] www.networkworld.com/news/2009/011409. Encryption-told-to-stop-ignoring.html? fsrc=rsssecurity, Last accessed August 24, 2010.

95
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...raufik tajuddin
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and SecurityAriantoMuditomo
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protectionNicha Tatsaneeyapan
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...Ulf Mattsson
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 

What's hot (18)

Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
D372326.pdf
D372326.pdfD372326.pdf
D372326.pdf
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 

Viewers also liked

Relationship between technical and vocational acquired skills and skills requ...
Relationship between technical and vocational acquired skills and skills requ...Relationship between technical and vocational acquired skills and skills requ...
Relationship between technical and vocational acquired skills and skills requ...Alexander Decker
 
Removal of lead and oil hydrocarbon from oil refining contaminated wastewater...
Removal of lead and oil hydrocarbon from oil refining contaminated wastewater...Removal of lead and oil hydrocarbon from oil refining contaminated wastewater...
Removal of lead and oil hydrocarbon from oil refining contaminated wastewater...Alexander Decker
 
Reduced levels of some iron parameters of protein energy
Reduced levels of some iron parameters of protein energyReduced levels of some iron parameters of protein energy
Reduced levels of some iron parameters of protein energyAlexander Decker
 
Production improvement function and corporate growth in the nigerian manufact...
Production improvement function and corporate growth in the nigerian manufact...Production improvement function and corporate growth in the nigerian manufact...
Production improvement function and corporate growth in the nigerian manufact...Alexander Decker
 
Quantitative analysis of total phenolic content in avocado (persia americana)...
Quantitative analysis of total phenolic content in avocado (persia americana)...Quantitative analysis of total phenolic content in avocado (persia americana)...
Quantitative analysis of total phenolic content in avocado (persia americana)...Alexander Decker
 
Production improvement function and corporate operational efficiency in the n...
Production improvement function and corporate operational efficiency in the n...Production improvement function and corporate operational efficiency in the n...
Production improvement function and corporate operational efficiency in the n...Alexander Decker
 
Psychological burnout and coping strategies of special education teachers in ...
Psychological burnout and coping strategies of special education teachers in ...Psychological burnout and coping strategies of special education teachers in ...
Psychological burnout and coping strategies of special education teachers in ...Alexander Decker
 
Reading meaning through the visual images social semiotic approach to tell ma...
Reading meaning through the visual images social semiotic approach to tell ma...Reading meaning through the visual images social semiotic approach to tell ma...
Reading meaning through the visual images social semiotic approach to tell ma...Alexander Decker
 

Viewers also liked (8)

Relationship between technical and vocational acquired skills and skills requ...
Relationship between technical and vocational acquired skills and skills requ...Relationship between technical and vocational acquired skills and skills requ...
Relationship between technical and vocational acquired skills and skills requ...
 
Removal of lead and oil hydrocarbon from oil refining contaminated wastewater...
Removal of lead and oil hydrocarbon from oil refining contaminated wastewater...Removal of lead and oil hydrocarbon from oil refining contaminated wastewater...
Removal of lead and oil hydrocarbon from oil refining contaminated wastewater...
 
Reduced levels of some iron parameters of protein energy
Reduced levels of some iron parameters of protein energyReduced levels of some iron parameters of protein energy
Reduced levels of some iron parameters of protein energy
 
Production improvement function and corporate growth in the nigerian manufact...
Production improvement function and corporate growth in the nigerian manufact...Production improvement function and corporate growth in the nigerian manufact...
Production improvement function and corporate growth in the nigerian manufact...
 
Quantitative analysis of total phenolic content in avocado (persia americana)...
Quantitative analysis of total phenolic content in avocado (persia americana)...Quantitative analysis of total phenolic content in avocado (persia americana)...
Quantitative analysis of total phenolic content in avocado (persia americana)...
 
Production improvement function and corporate operational efficiency in the n...
Production improvement function and corporate operational efficiency in the n...Production improvement function and corporate operational efficiency in the n...
Production improvement function and corporate operational efficiency in the n...
 
Psychological burnout and coping strategies of special education teachers in ...
Psychological burnout and coping strategies of special education teachers in ...Psychological burnout and coping strategies of special education teachers in ...
Psychological burnout and coping strategies of special education teachers in ...
 
Reading meaning through the visual images social semiotic approach to tell ma...
Reading meaning through the visual images social semiotic approach to tell ma...Reading meaning through the visual images social semiotic approach to tell ma...
Reading meaning through the visual images social semiotic approach to tell ma...
 

Similar to Protection and defense against sensitive data leakage problem within organizations

Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxtodd581
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxglendar3
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docxeugeniadean34240
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
How to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfHow to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfrohit219406
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 

Similar to Protection and defense against sensitive data leakage problem within organizations (20)

Data Security
Data SecurityData Security
Data Security
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
DG for Fed
DG for FedDG for Fed
DG for Fed
 
How to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfHow to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Protection and defense against sensitive data leakage problem within organizations

  • 1. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 Protection and Defense against Sensitive Data Leakage Problem within Organizations 1-Sahem A. Nawafleh E-business & E-commerce department - University Of Petra 2-Muneer Y. F. Hasan Management information system department - University Of Petra 3-Yousef Nawafleh The Jordanian Ministry of Justice 4-Suha Amin A. Rahman Fakhouri AL-Ghad international medicl science colleges Abstract Information security has never been as important as it is today for the business, health, and educational organizations, in addition to individuals because many organizations around the world depend, today, on reliable information to perform their daily tasks. Additionally, the information needs to be timely, accurate, complete, valid, consistent and relevant to any use on the organization. The information, confidentiality, is measured as a main topic for many organizations around the world that attempt to find the best way to protect them from hackers' attacks, so it is possible for organizations and individuals to protect themselves by being skilled on the importance of security and gaining awareness of the possible security attacks that they may encounter. This paper proposed an integrated solution for preventing and reducing intentional sensitive data leakage actions through implementing a series of effective procedures, for instance: monitoring user’s actions, protecting sensitive data properly against any intentional or accidental leaks, and guarantee these data not to be reached to the wrong individuals or groups from inside/outside the organization. The proposed sensitive Data Leakage Prevention (DLP) solution involves identification, monitoring, and protecting three groups of significant organization's data: data at rest, data in use, and data in motion. Index Terms : Sensitive data, Data Leakage, Data Leakage Prevention (DLP) solution, Acceptable Use of Information (AUI), Data in use, Data at rest, Data in motion. 1. Introduction Nowadays, Information Security became a vital and a major subject especially with the spreading of information sharing among private and public networks for all organizations across different industrial sectors e.g. telecom, banking and education all over the world. The importance of securing information is playing a significant role especially when sharing, distributing, accessing and publishing any information that's been classified as a sensitive either for the organization itself or the clients whom sharing their private information with the organization, like information that has been stored, shared, distributed and viewed through the electronic document systems and/or images of paper document systems which is widely used by a lot of organizations. Many organizations have a great deal of attention that has been given to protect their sensitive data from outside threats by using a set of security countermeasures like: intrusion prevention systems, firewalls, and management of thevulnerable points inside them. So, organizations must now turn their attention to equal critical situations that forms, for them, as a big challenge today’s: the problem of data leaking or loss from the inside. In fact, in many organizations, there is a gap in controlling, monitoring, and protecting its business environment and electronic data assets from leakage or loss to the wrong individuals or groups intentionally or accidentally. This gap is now ubiquitous in businesses, health, educational organizations and individuals who are needed to communicate with each other over the Internet networks. In our days, many electronic communications which are used heavily inside any organization for many purposes ,for instance: local mail, instant messaging, web mail, transferring data files , and also organization's website, are still used largely in different destinations without any limitations, monitoring , and controlling for its movements from the organization, thus the expected result for this issue that there is a huge potential confidential information of the organization to surely fall into the wrong hands. From this significant point, this organization's sensitive data should be protected very well or will be faced with tragedy results like: business loss, reputation damage, bad publicity, strategic customer loss, and loss 87
  • 2. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 of the competitor with other organizations. As a result, any organization that uses a similar electronic document system must keep a close eye for securing sensitive information that is going forth/back through this system or the application to maintain business continuity and reputation and to ensure regulations, law compliance along with differentiating from others. In this paper we talk about one of the most new methodologies and techniques solution that has been raised to the top is the Data Leakage Prevention (DLP) solution which is basically protecting sensitive data of an organization from being viewed by wrong individuals, being from outside the organization, or even from inside it. This basically means that specific data can be viewed by only a specific set of an authorized individuals or groups [3]. The sensitive Data leakage prevention (DLP) became one of the most critical issues that faces Chief Information Officers (CIOs), Chief Security Officers (CSOs), and Chief Information Security Officers (CISOs). On the other hand, the DLP's solution is considered as one of the most vital security approaches and techniques that effectively assist organizations today in protecting the organization's sensitive data from leaking into the wrong hands. It's playing a major role as a part of the overall information security system framework that can integrate with existing infrastructure and systems like electronic document management systems to provide a comprehensive , holistic and effective information security strategy inside the organization [5]. 2. Background Many published papers and reports talk about the importance of (1) identification of sensitive data in any organization, (2) applying a suitable information policy to protect it from leakage into the wrong hands, (3) finally explain the benefits that any organization can gain from preventing data leakage and prove this issue that can be satisfied by controlling and monitoring the document viewer side. Eric Maiwald thinks that the identification of information policy within any organization is considered as the most important part according to many justifications like [1]: (i) The information policy defines what sensitive data is within the organization and that data should be protected. This policy should be constructed to cover all data within the organization. (ii) Each employee is responsible for protecting sensitive data that comes into the employee's possession. These data can be in the form of electronic documents or paper records, thus the organization's policy must take both into account. (iii) To protect your data from leakage you must classify the data documents into a set of levels according to their importance like: 1- Public Classification (lowest level): The data are not sensitive and can be provided to the public. 2- Private Classification (Medium level): The data are confidential and can be provided only to the authorized employees or to other organizations. 3- Sensitive Data Classification (Highes level): The data are very sensitive and must be restricted to a limited number of employees within the organization. These data must be protected well by not provided to all employees or to the individuals outside of the organization. (iv) The information policy must address how sensitive data is transmitted. The sensitive data can be transmitted through a number of ways such as (Email, Fax, and so on), and the policy should address each of them very well. Securosis -information security company- report which published on Feb/2009 described the (A) Main features of Data Leakage Prevention (DLP) life cycle, where all these (B) features are tied together in the DLP cycle as the following [7]: 88
  • 3. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 Fig1: DLP Features Cycle [7] 1. Define: The first feature which concerns with building a proper organization information policy that defines the data to be protected, and how to protect it very well. 2. Discover: The second feature which uses the DLP solution to find the definition data throughout the organization. And then relocate or remove information where it shouldn’t be. 3. Monitor: The third feature which concerns in track usage of the defined data at risk, in motion, and in use. Then it can generate a proper warning alert if and only if any organization's Information policy had been violated. 4. Protect: The fourth feature which concerns with protecting sensitive data from leaking by quarantine emails, relocate files, block copies to portable storage, and other enforcement actions. (B) Define Data Leakage Prevention concept as "Products that, based on central policies, identify, monitor, and protect data at risk, in motion, and in use through deep content analysis". This definition contains the core components of a DLP solution: centralized management, identification of defined data, monitoring of usage, and protection from policy violations. A DLP solution can do this in data storage, on networks, and on employees' computers, using advanced analysis techniques, thus this solution can provide better protection and more cost effective in the long term. (C) They expected more benefits that can be gained from implementing a proper DLP solution within any organization like the following [7]:  Risk Reduction: You can reduce the risk of threats and the possibility of data leakage by knowing where your data is stored and how it’s being used.  Cost Savings: DLP solution may help to reduce other costs associated with data management and security.  Compliance support: DLP solution helps to reduce the direct costs associated with some regulatory compliance from all employees within the organization.  Policy enforcement: Many data management policies in different organizations are difficult or impossible to enforce. The DLP solution supports enforcement of Acceptable Use of Information (AUI), not just security controls.  Data security and Threat management: While no security tool stops all threats, DLP solution reduces the risk of certain malicious activity. on March 2008, many of specialized corporations such as International Data Corporation (IDC), which is a leading center in the world of information security researches' and analysis specifically for many sectors such as: 89
  • 4. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 information technology, and telecommunications. Its report which was published to demonstrate the dangers of accidental exposure for organization's sensitive data and considered it as the number one threat. [8]. At the end of the same year, another study for the same corporation has shown many important facts like: 80 percent of respondents in the survey have agreed on that data security was one of the biggest challenges facing them, and with 50 percent of respondents have possessed a good experience to deal with incidents of leakage of sensitive data inside different sectors of the organization. [9] Another important IDC’s survey indicated that the problem of intellectual property has now become one of the most acute problems that faces many organizations today, especially for the sensitive data leakage problem. 81 percent of those surveyed saw that Information Protection and Control (IPC) – can definitely be considered, as monitoring, encrypting, filtering, and blocking sensitive data contained in data at risk, data in motion, and data in use, as an important part of the overall strategy to protect the data within the organization. The highest priority of information protection and control (IPC) solution was data leakage prevention (DLP) which deployed at the organization’s perimeter and on all endpoint computers within the organization. [8] Fig2: Importance of monitoring employee use [8] The respondents to IDC’s survey demonstrated the importance of [monitoring employee use] and showed that the accidental or intentional exposure of confidential information of the organization, is ranging from legally protected personal information to intellectual property and any significant secrets about organization, is something that affects on the IT environment in its widest sense, involving lost or stolen laptops, hacking employees' emails and any other vital applications for them. Nowadays, the main challenge for many organizations is not how to find the best way to protect the sensitive data from the threat or corruption of malware programs , but just how it can add a proper second security layer that can prevent data that's being accessed if it is lost. A Sophos white paper which published on Feb/2009 under the title “Stopping Data Leakage” demonstrated the importance of enabling DLP solution within the organization by creating and enforcing an Acceptable Use Policy (AUP) to support any attempts to stop data leaking from the organization. It also proposed three steps to make an AUP success [5]: Step (1): Create the suitable policy within the organization. Step (2): Educate employees and users about the policy. Step (3): Enforce the policy properly. The AUP should cover many issues that are very important for the employees within the organization to be known for them clearly such as [5]: i. Determine clearly what information or documents must not be emailed. ii. Determine whose persons or organizations are authorized to access, receive, and see the sensitive data documents. iii. Determine what operations/actions are allowed on the sensitive data documents. 90
  • 5. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 iv. The organizational policy in sending a specific document over the web or downloading it from the web. v. The organizational policy on storing sensitive data on desktops, PC’s, laptops, and so on. 3. Main Work Nowadays, many business organizations have become vastly depending on online transactions; to complete its works efficiently and accurately, thus saving time and cost for them. This option makes a big chance for transferring data between many nodes within the organization in a more flexible way, but at the same time it faces many challenges and limitations for instance finds the best way for monitoring, keeping, and preventing data from leakage to unauthorized people. Many organizations over the world find themselves, after years of enforcing viruses, intrusions, and email spam problems, facing a significant new security issue but it becomes more important in huge data leakage. Therefore, different organizations sectors today (e.g. Health, telecom, banking, and education) are becoming increasingly more aware of the acute need to control, very well, the information that flows into, through and out of their own networks. One of these solutions is a DLP Solution which is considered as the best solution that can be used by the organizations and vendors who are offering services or products to prevent Sensitive data from reaching to unauthorized persons and others [4]. The most important part in any DLP solution involves developing awareness training courses for the users to achieve data leakage prevention through teaching them how to deal with expected security attacks that can happen for them at any moment. However, this solution does not guarantee a complete protection as data leakage may occur intentionally by leaking data or accidentally by sending data to wrong receivers. The main contribution of this paper is describing a new security solution [DLP Solution] which can be used effectively in reducing intentional sensitive data leakage actions through monitoring user’s actions properly. On the other hand, this solution can be regarded as “integrated” if and only if it is able to: • Protecting the organization's sensitive data against any accidental or intentional leakage. • Securing the organization's sensitive data so that, if it leaked or lost, it cannot easily be read by others. 4. The Process of Identifying Sensitive Data Sensitive data is any data that when it leaks, it can cause harm to somebody or an organization. Sensitive data may contain: 1- Personal Information 2- Information about the organization. There are various examples of sensitive data:          Social Security number (SSN). Credit card number. Personal information about patients. Financial data of the organization. Personal information about students. Students’ records (study plans, marks). Employees personal information. Research data within the university. University special Legal data. 5. The Process of Identifying Sensitive Data Leakage Prevention (DLP) Solution Data Leakage Prevention (DLP) is a computer security term that involves the identification, monitoring, 91
  • 6. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 and protecting three groups of organizing data [7]: 6. Data at Risk “Data at Risk” is a recorded and stored data in media storage or any data that resides in filing systems, databases and other storage methods [3, 6]. This data can be regarded as “Secure” if and only if: • The data is protected by strong encryption (where “strong encryption” is defined as “encryption requiring a computationally infeasible amount of time to brute force attack”). • The key (required to decrypt the data) is (i) not presenting to the media itself (ii) not present on the node associated with the media; and (iii) is of sufficient length and randomness to be functionally immune to a dictionary attack. 7. Data in Use • “Data in Use” is all data that is not at risk state, and only on one particular node in a network (for example, in resident memory, swap, processor cache or disk cache, or memory) [3, 6]. This data can be regarded as “Secure” if and only If: • The Access to the memory is thoroughly controlled (the process that accessed the storage media data and read it into memory is the only process that has an access to the memory. • Regardless of how the process (the owner of the data) terminates, (either by successful completion, killing the process, or shutting down the computer), the data cannot be retrieved from any location other than the original at risk state, requiring re-authorization. 8. Data in Motion • Or “Data in Transit” is all data being transferred between two nodes in a network [3, 6]. This data can be regarded as “Secure” if and only if: • Both nodes (the source and the receiver of the data) are capable of protecting the data in the previous two classifications from any threats. • The communication between the two hosts is identified, authenticated, authorized, and private; meaning that no third node over the network can overhear the communication between the two endpoint nodes. 9. Data Leakage Prevention (DLP) Techniques Protecting those data groups is achieved through the following techniques that can be found in DLP literature [ 6]: • Deep content inspection (Advanced Option). • Contextual security analysis of transaction (attributes of originator, data object, medium, timing, and recipient/destination). • A centralized management framework. The systems are designed to detect and prevent the unauthorized use and transmission of confidential information. 10. How is Data Leakage Prevention (DLP) different from other security technologies? Conventional security tools that have been in use, such as firewalls and An Intrusion detection system (IDS) /Intrusion prevention system (IPS) look for anything that can form or pose a threat to the organization's information and then obtain set of steps to deal with these threats. But Data leakage prevention (DLP) solution is interested in identifying the sensitive data inside the organization and then the first option is monitoring the users’ usage and the last option is preventing them from leakage to unauthorized organizations or people [3]. 92
  • 7. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 11. DLP Integrated Solution The truth is that, most business organizations in the world across different sectors (governmental establishments, ministries, specialized companies, banks, and universities), for example, don’t have enough technical staff, governmental /special funds, resources, and they need for intensive efforts to implement suitable security requirements within the sturdy strategy security plan to face the data leakage problem effectively. Accordingly, an urgent need emerged for organizations to implement a series of new security solutions that combine the features of a DLP solution with other security tools to provide an integrated solution to this problem from its roots. Hence, this paper has proposed an integrated solution based on the achievement of two main phases [Two Layers of Defense], which can be summarized as following: Phase (1): (First layer of defense) Protecting sensitive data of an organization Endpoint protection (Protecting Data inside Organization): The proposed procedures to guarantee endpoint nodes inside the organization are safely. Table 1: Endpoint Protection Procedures Prohibiting the use of non-necessary applications such as wireless network connections, sharing files, FTP clients, instant messaging service (IM), and unauthorized email clients. Therefore, all employees should be fully aware of the dangers of sending and sharing organization’s data via these applications. Blocking different spyware programs that can be used effectively by information's hackers in hacking sensitive data of an organization by using powerful anti-malware solutions. Checking carefully that every PC connected to network within the organization is compatible with the organization’s security policy. Managing properly access operations to any type of portable storage devices such as USB keys and others. Consequently, these devices can cause a high security risk within any organization, because they can be easily lost. Gateway protection (Protecting Data outside Organization): At present, many organizations have their own websites and e-mail; these may contain a lot of security functions that can be used to prevent sensitive/confidential data from being sent outside the organization or to un-authorized users within the organization.These Features include: Table 2: Gateway Protection Procedures Monitoring and Controlling users from accessing particular websites, well-known webmail sites (e.g. Yahoo! Mail and Google email), and applications which can cause a serious threat to the organization itself. Preventing users from uploading or downloading certain types of data files and warn them clearly from unauthorized file types which are received in their emails. Controlling and blocking the unauthorized use of Instant Messaging (IM) and FTP traffic between the users themselves or with other users/organizations from outside. 93
  • 8. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 Adopting a series of preventive measures to protect against “drive-by-downloads” feature’s which secretly place specific spyware code on the user’s PC when they accidentally visit a particular sabotage website. Consequently, these tricks require from the users' within the organization to be well aware the seriousness of these threats if occurred. Verifying the contents of web traffic periodically to ensure it is free from any Viruses, spyware, and malware. On the other hand, being confident that these programs will not be downloaded into the user’s PC. Scanning accurately the Contents of email messages and attachments of various kinds to control and prevent sensitive data from leakage by identifying a specific keywords relating to confidential data of the organization. Phase (2): (Second layer of defense) Securing sensitive data of an organization In fact, despite of having the best solutions for data leakage problem and the best policies for securing the sensitive data of an organization, there still a possibility of leakage or loss at any moment in the wrong hands intentionally or accidentally. So it is essential to have a second layer of defense [Encryption Sensitive Data]. Data encryption is considered as one of the traditional methods that have been used effectively for a long period to protect data when moving from one place to another. Over the past years, many researchers and specialists in information security agreed on that the percentage of the potential risk, for the organization itself or the users, will be reduced if data had been encrypted very well compared with non-encrypted data. If the organization wants to secure its sensitive data and devices, they should: Table 3: Secure Data Procedures Perform full disk encryption for PC’s, laptops, and notebooks according to their importance. Encrypt sensitive data which are stored on removable storage devices (e.g. USB drives, CDs and DVDs). Encrypt E-mail’s content to prevent unauthorized users from reading them. Encrypting sensitive data and devices, that is used in the organization, this way indicate that both are subsisted in a safe mode, even if they reached the wrong hands. But the main question which must take into consideration; whether if encrypting sensitive data only, is enough to protect it from any risk 12. Conclusion Sensitive Data leakage prevention problem, become as one of the most vital security issues facing Organizations today. The most effective solution to the problem is to see Data Leakage Prevention solution (DLP) as part of the overall security problem. This solution can be integrated fully with other security tools within organization to form a comprehensive security strategy plan to protect these data properly .DLP solution can be used effectively in reducing intentional sensitive data leakage actions through monitoring user’s actions and protecting three groups of organizing data: data at risk, data in use, and data in motion. This solution can be regarded as “integrated” through the achievement of two main phases [two layers of defense]: protecting sensitive data and securing sensitive data of an organization. The organization also needs to create an Acceptable Use Policy (AUP) for users, at the same time ensuring both are compliant with organizational policies. 94
  • 9. European Journal of Business and Management www.iiste.org ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.23, 2013 To avoid data leakage, organizations must evaluate their weakness and respond appropriately in many ways like: Endpoints protection, Gateway protection, and encryption data. 13. References [1] Eric Maiwald, “Fundamentals of Network Security”, McGraw-Hill November 2003. [2] John M. Carrol, “Computer Security”, Third Edition Butterworth-Heinemann 1996. [3] Prathaben Kanagasingham, “Data Loss Prevention” (Aug/2008), Retrieved November 14, 2009 from http://www.sans.org/reading_room/whitepapers/dlp/data_loss_prevention_32883. [4] Sans Security Institute, “SANS What Works in Data Leakage Prevention & Encryption Summit” (Jan/2010), Retrieved January 16, 2010 from http://www.sans.org/data-leakage-prevention2010. [5] Sophos Institute, "Stopping data leakage: Making the most of your security budget", Published 19 November 2009, Retrieved January 18, 2010 from http://viewer.bitpipe.com/viewer/viewDocument.do?accessId=11492295. [6] Sans Security Institute and Securosis, "Understanding and Selecting A Data Loss Prevention Solution" (2009), Retrieved January 24, 2010 from http://www.websense.com/site/Docs/whitepapers/en /Understanding_and_selectinga_DLP_solution_wp. Pdf. [7] Securosis Information Security Research and Analysis, "The Executive Guide to Dat Loss Prevention" (2009), Retrieved January 24/ 2010 from http://www.websense.com/site/docs/whitepapers/en/Mogull_DLP_WP.pdf. [8] IDC, “Information Protection and Control Survey: Data Loss Prevention and Encryption Trends”, Doc # 211109, March 2008, Last accessed August 24, 2010 [9] www.networkworld.com/news/2009/011409. Encryption-told-to-stop-ignoring.html? fsrc=rsssecurity, Last accessed August 24, 2010. 95
  • 10. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar