SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 643
STRATEGIES FOR DATA LEAKAGE PREVENTION
Anirudh Garg, Ashish Kumar, Pradeep Kumar H. S.
Department of Information Science and Engineering, National Institute of Engineering, Mysore, India
Assistant Professor, Department of Information Science and Engineering, National Institute of Engineering,
Mysore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today's world knowledge is power so data
leakage has become a major concern for any organization or
an individual who doesn't want theirinformationordatatobe
leaked to outsiders who they did not want to divulge the
information, but they cannot be sure that the employees
working under them will have the best interest of the
organization and won't put their personal agendas in front so
to we want to prevent any confidential information to not
leave the premises of the organization to ensure that we
protect the data with the help of a firewall which will scan all
the outgoing messages sent by the employee if the transfer is
not authorized by the administrator the employee will be
reported and there will be repercussions for his/her actions
this is a very important procedure in present day
organizations because by the time we detect that data has
been leaked it may be too late to take any action so we need to
be one step ahead of the problem. It involves a firewall
,keyword-recognition and identifying the guilty agent.
1.INTRODUCTION
In this paper, we develop a model for protecting the
information that we want to protect and we are going to see
how the data can be leaked and what measures our data
leakage prevention implementations reduce these threats,
we are also going to make a software which will help us
prevent data leakage. As we have seen data leakage is a
major concern because in present information is power, so
we have designed a software in which the admin or the
administrator (distributor) can send the message like an e-
mail, message via some other service to an agent or multiple
agents now if that agent wants to send that data to some
unauthorized person or we can say if he wants to leak the
data to someone outside the company which may ormay not
cause harm to the company itself, as he is not authorized to
send this data to anyone, the firewall that we have installed
in the pc of the employees will scan the whole document and
will determine whether the file or information that the
employee is trying to share is in his jurisdiction or if he is
trying to send a data with confidential information, this will
be determined by scanning the document and determining
how many keywords have matched withthedocumentandif
the firewall gets a red-flag(if it gets a common keyword) the
employee's ID will be sent to the administrator and then it's
up to the administrator to decide if he wants to take action
and if he does how severe the consequences.
2. LITERATURE SURVEY
Now a day's most of the businesses be it minute or
multinationalallare making use of the networkinsomeform
or the other this can be seen by the booming use of the cloud
to store the data of the companies in the cloud storage which
are more flexible i.e. they can be accessed remotely and can
add storage value to it, then to be stored in physical drives,
cloud is being used by most of the notable companies ,
marketplace and academic world. number of notable
commercial and individual cloud computing services, e.g.,
form Amazon, Google, Microsoft, Yahoo,andSalesforce.Also,
top database vendors, like Oracle, as they are adding cloud
support to their databases.
The providers are enjoying the opportunity to be able to
build a market to sell cloud space or storage to the people
who are willing to buy for a relatively low-cost as compared
to physical storages, these low-costand pay forusecloudcan
only work if the providers are able to provide the required
amount of protection to the data. quick provisioning, quick
flexibility, everywhere network contact, hypervisor defense
against network vulnerability, economical failure recovery
and data storage solution, on-request security checks,
synchronized detection of system altering and rapid re-
construction of services.
The cloud provides this compensation,untilsomeoftherisks
are better understood. The basic concept of the cloud , based
on the services they offer, form application service
provisioning, grid and service computing, to Software as a
Service. Despite of the specific architecture, the dominant
concept of this computing model is that customers’ data,
which can be of individuals, organizations or enterprises, is
processed remotely in unknown machines about which the
user not aware. The ease and efficiency of this approach,
however, comes with privacy and security risks.
Confidentiality of data is the main hurdle in implementation
of cloud services[1].
3.EXISTING SYSTEMS
Data Leakage Prevention (DLP) is a very integral part of our
society because we need to not only punish who are trying
to access restricted information but we have to take every
precaution that it does not happen in the first place, so that
why we have some of the data leakage prevention strategies
which are in place in our present society.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 644
1. IDS/IPS
IDS - IDS is an acronym for intrusion detectionsystem,itis
a device or software application that monitorsnetworksand
system activities for malicious activities such as Any
detected activity or violation is typically reported either to
an administrator or collected centrally using a security
information and event management (SIEM) system. A SIEM
system combines outputs from multiple sources, and uses
alarm filtering techniques to distinguish malicious activity
from false alarms[2].
IPS - IPS is an acronym for intrusion prevention system, it
monitors networks, system activitiesformaliciousactivities,
examines network traffic flows to detect and prevent
vulnerability exploits. Vulnerability exploits usuallycomein
the form of malicious inputs to a targetapplicationorservice
that attackers use to interrupt and gain control of an
application or machine[3].
IPS systems are expansion of intrusion detection systems
because they both monitor network traffic, system activities
for malicious activity, IPS are able to prevent or block
intrusions that are detected. This can perform actions such
as indicating an alarm, leaving the malicious packets.
2. Anti-Malware
Malware is short for malicious software, they are any
software which hinder with the functioning of a device or
can be used to enter into a device without consent or can be
used to gather information which the user is not ready to
share(simply put access restricted information). Type of
malwares is virus, worms, Trojans, spyware, backdoors, etc.
Malware have two categories:
 Malware which modifies the recourses such as
memory, BIOS Code, PCI devices expansions
EEPROMS [4].
 Malware that does not modify any of those
resources, but only the resources which are
dynamic by nature, like e.g. data sections,suchasby
modifying some function pointers in some kernel
data structures, so that the attackers code gets
executed instead of the original system or
application.
Antivirus or Anti-virus software also sometimes called anti-
malware software are used by computer and suchdevices to
prevent them from getting infested with malwares.
They work in the real-time environment i.e. they will keep
on scanning the systems and ifand whenanti-malwarescans
a malware it scans the severity of the threat and take action
accordingly, user can also configuretheanti-malwaresothat
user know which action will be taken either it will be
cleaned, quarantined or deleted.
4.PROPOSED SYSTEM
In the proposed system we use a firewall forthedata leakage
prevention, in this approach the administrator or the
distributor sends a message to all the agents that are
authorized to access the information and no one else, we
have to be sure that the agents to whom we have provided
the information should not or must not release this
information to someone outside the authorized circle, as we
cannot be sure what an an-authorized person may do with
this information.
So we use a firewall approach to ensure that such a thing
does not happen in the first place because in case of data
leakage detection it can only be done when data has already
been leaked , and by the time we find out who has leaked the
information and to where it can already be too late to do
anything.
Fig -1: Use Case Diagram for Distributor
So we use data leakage prevention policy in which the
administrator sends the message to the authorized parties
and that document is scanned by the firewall because
firewall is a software which keeps track of all the
transactions and keep any unauthorized person to access
our information but in our case the firewall has been
modified such that it keeps the unauthorized user from
sending or divulging sensitive information to someone
outside the authorization policy[5].
The firewall stores the message sent by the administratoror
the distributor to the agent and when that agent if he tries to
send that information outside the work area via e-mal, or
any other messaging service the firewall will scan the
message and compare it with the message the distributor
sent if the message is found consistent, an alert will be sent
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 645
to the administrator about the attempt in leaking of data
(attempt because the firewall will prevent the agent to
deliver the message) and the id of the agent who is
responsible for the attempt[6].
After the alert has been sent the administratorcanseewhich
of his agent or agents have tried to leak the information and
can take actions according to his will and what the company
bylaws allow, becauseiftheygounpunishedthey/he/her are
most likely to try and leak data again and this time they
might be successful.
Fig -2:Flowchart for Agent
5.METHODOLOGY
In this paper weprovide a description of all the stepsthatthe
data leakage prevention strategy will follow as to not all data
to be accessed by unauthorized user outside the circle to
which the administrator has determined :
1. The request is sent to the distributor or the
distributor may initiate the process.
2. The request may be implicate or explicate.
3. If implicate a message is generated.
4. If explicate it is checked whether he is a legitimate
user to which the information can be divulged(it is
chosen by the distributor whether the agent is
legitimate or not).
5. The message is sent after the verification.
6. The messaged is accessed by the recipient.
7. The recipient tries to send this message to anyone
outsidethe organization or the authorizedpersonal.
8. The message is scanned to see if it contains any
confidential information.
9. If not the message is sent.
10. If yes, then the message is not sent and an alert is
sent to the distributor.
11. The recipient is then identified and is reveled to the
distributor.
These are the steps that are to be followed by the data
leakage prevention program as to prevent leakage and
identify the culprit so as to prevent such action from
happening in the future.
Fig -3:Flowchart for Distributor
In the prevention system the distributor or the
administrator has full access the prevention system denies
access to both agent and the target of the sent file from the
agent outside the organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 646
Fig -4: Control Flow Diagram for Prevention System
6.CONCLUSION
This paper help us to comprehend how much power is there
in information and there are peopleinthesameorganization
or company who may try to steal this information or pass it
on to someone who may or may not use it to harm the
organization, so we should take as many precautions as we
can so that we does not end up being a victim of data
leakage, and the first precaution that we need to take is to
prevent the data getting leakedinthefirstplace,andbecause
sometimes data will get leaked so in that case we have data
leakage detection but we don't know how much damage
would have been done to the clients and the company so it is
best to be prepared. As firewall is to filterwhoareallowedto
access the computer and what we are trying to send outside
the network because of this, Data leakage prevention with
the help of a firewall will help us as it will not allow anyone
who does not have authorization able to send a message
outside the company or organization , and if he tries he will
be caught and punished.
REFERENCES
[1] https://en.wikipedia.org/wiki/Intrusion_detection_
system
[2] http://www.iosrjournals.org/iosr-jce/papers/vol1-
issue3/S0132836.pdf
[3] https://www.paloaltonetworks.com/documentatio
n/glossary/what-is-an-intrusion-prevention-
system-ips
[4] https://vxheaven.org/lib/pdf/Introducing%20Steal
th
%20Malware%20Taxonomy.pdf
[5] https://digitalguardian.com/blog/cisos-guide-data-
loss-prevention-dlp-strategy-tips-quick-wins-and-
myths-avoid
[6] https://www.digitalocean.com/community/tutorial
s/what-is-a-firewall-and-how-does-it-work

More Related Content

What's hot

Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
PrescottLunt384
 
NASA OIG Report
NASA OIG ReportNASA OIG Report
NASA OIG Report
Priyanka Aash
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
amaranthbeg55
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
Priyanka Aash
 
Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbook
Yulia Dianova
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
ijcsit
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
ijctet
 
Information security
Information securityInformation security
Information security
festus mwangi
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
CheapSSLsecurity
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
David Sweigert
 
code of conduct
code of conductcode of conduct
code of conduct
David Waddell
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
IJERA Editor
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
sandra sukarieh
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
IJNSA Journal
 

What's hot (19)

Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
NASA OIG Report
NASA OIG ReportNASA OIG Report
NASA OIG Report
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbook
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Information security
Information securityInformation security
Information security
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
 
code of conduct
code of conductcode of conduct
code of conduct
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 

Similar to Strategies for Data Leakage Prevention

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
IRJET Journal
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
toltonkendal
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
IJNSA Journal
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
deanmtaylor1545
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
IJNSA Journal
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
rtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
jeffsrosalyn
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
sheikhparvez4
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
IRJET Journal
 
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakA System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
IRJET Journal
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
Mobeen Khan
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
ADGP, Public Grivences, Bangalore
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
Norman Funzani Manenzhe
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
Maria Perkins
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 

Similar to Strategies for Data Leakage Prevention (20)

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakA System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
IDS Research
IDS ResearchIDS Research
IDS Research
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 

Recently uploaded (20)

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 

Strategies for Data Leakage Prevention

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 643 STRATEGIES FOR DATA LEAKAGE PREVENTION Anirudh Garg, Ashish Kumar, Pradeep Kumar H. S. Department of Information Science and Engineering, National Institute of Engineering, Mysore, India Assistant Professor, Department of Information Science and Engineering, National Institute of Engineering, Mysore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today's world knowledge is power so data leakage has become a major concern for any organization or an individual who doesn't want theirinformationordatatobe leaked to outsiders who they did not want to divulge the information, but they cannot be sure that the employees working under them will have the best interest of the organization and won't put their personal agendas in front so to we want to prevent any confidential information to not leave the premises of the organization to ensure that we protect the data with the help of a firewall which will scan all the outgoing messages sent by the employee if the transfer is not authorized by the administrator the employee will be reported and there will be repercussions for his/her actions this is a very important procedure in present day organizations because by the time we detect that data has been leaked it may be too late to take any action so we need to be one step ahead of the problem. It involves a firewall ,keyword-recognition and identifying the guilty agent. 1.INTRODUCTION In this paper, we develop a model for protecting the information that we want to protect and we are going to see how the data can be leaked and what measures our data leakage prevention implementations reduce these threats, we are also going to make a software which will help us prevent data leakage. As we have seen data leakage is a major concern because in present information is power, so we have designed a software in which the admin or the administrator (distributor) can send the message like an e- mail, message via some other service to an agent or multiple agents now if that agent wants to send that data to some unauthorized person or we can say if he wants to leak the data to someone outside the company which may ormay not cause harm to the company itself, as he is not authorized to send this data to anyone, the firewall that we have installed in the pc of the employees will scan the whole document and will determine whether the file or information that the employee is trying to share is in his jurisdiction or if he is trying to send a data with confidential information, this will be determined by scanning the document and determining how many keywords have matched withthedocumentandif the firewall gets a red-flag(if it gets a common keyword) the employee's ID will be sent to the administrator and then it's up to the administrator to decide if he wants to take action and if he does how severe the consequences. 2. LITERATURE SURVEY Now a day's most of the businesses be it minute or multinationalallare making use of the networkinsomeform or the other this can be seen by the booming use of the cloud to store the data of the companies in the cloud storage which are more flexible i.e. they can be accessed remotely and can add storage value to it, then to be stored in physical drives, cloud is being used by most of the notable companies , marketplace and academic world. number of notable commercial and individual cloud computing services, e.g., form Amazon, Google, Microsoft, Yahoo,andSalesforce.Also, top database vendors, like Oracle, as they are adding cloud support to their databases. The providers are enjoying the opportunity to be able to build a market to sell cloud space or storage to the people who are willing to buy for a relatively low-cost as compared to physical storages, these low-costand pay forusecloudcan only work if the providers are able to provide the required amount of protection to the data. quick provisioning, quick flexibility, everywhere network contact, hypervisor defense against network vulnerability, economical failure recovery and data storage solution, on-request security checks, synchronized detection of system altering and rapid re- construction of services. The cloud provides this compensation,untilsomeoftherisks are better understood. The basic concept of the cloud , based on the services they offer, form application service provisioning, grid and service computing, to Software as a Service. Despite of the specific architecture, the dominant concept of this computing model is that customers’ data, which can be of individuals, organizations or enterprises, is processed remotely in unknown machines about which the user not aware. The ease and efficiency of this approach, however, comes with privacy and security risks. Confidentiality of data is the main hurdle in implementation of cloud services[1]. 3.EXISTING SYSTEMS Data Leakage Prevention (DLP) is a very integral part of our society because we need to not only punish who are trying to access restricted information but we have to take every precaution that it does not happen in the first place, so that why we have some of the data leakage prevention strategies which are in place in our present society.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 644 1. IDS/IPS IDS - IDS is an acronym for intrusion detectionsystem,itis a device or software application that monitorsnetworksand system activities for malicious activities such as Any detected activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources, and uses alarm filtering techniques to distinguish malicious activity from false alarms[2]. IPS - IPS is an acronym for intrusion prevention system, it monitors networks, system activitiesformaliciousactivities, examines network traffic flows to detect and prevent vulnerability exploits. Vulnerability exploits usuallycomein the form of malicious inputs to a targetapplicationorservice that attackers use to interrupt and gain control of an application or machine[3]. IPS systems are expansion of intrusion detection systems because they both monitor network traffic, system activities for malicious activity, IPS are able to prevent or block intrusions that are detected. This can perform actions such as indicating an alarm, leaving the malicious packets. 2. Anti-Malware Malware is short for malicious software, they are any software which hinder with the functioning of a device or can be used to enter into a device without consent or can be used to gather information which the user is not ready to share(simply put access restricted information). Type of malwares is virus, worms, Trojans, spyware, backdoors, etc. Malware have two categories:  Malware which modifies the recourses such as memory, BIOS Code, PCI devices expansions EEPROMS [4].  Malware that does not modify any of those resources, but only the resources which are dynamic by nature, like e.g. data sections,suchasby modifying some function pointers in some kernel data structures, so that the attackers code gets executed instead of the original system or application. Antivirus or Anti-virus software also sometimes called anti- malware software are used by computer and suchdevices to prevent them from getting infested with malwares. They work in the real-time environment i.e. they will keep on scanning the systems and ifand whenanti-malwarescans a malware it scans the severity of the threat and take action accordingly, user can also configuretheanti-malwaresothat user know which action will be taken either it will be cleaned, quarantined or deleted. 4.PROPOSED SYSTEM In the proposed system we use a firewall forthedata leakage prevention, in this approach the administrator or the distributor sends a message to all the agents that are authorized to access the information and no one else, we have to be sure that the agents to whom we have provided the information should not or must not release this information to someone outside the authorized circle, as we cannot be sure what an an-authorized person may do with this information. So we use a firewall approach to ensure that such a thing does not happen in the first place because in case of data leakage detection it can only be done when data has already been leaked , and by the time we find out who has leaked the information and to where it can already be too late to do anything. Fig -1: Use Case Diagram for Distributor So we use data leakage prevention policy in which the administrator sends the message to the authorized parties and that document is scanned by the firewall because firewall is a software which keeps track of all the transactions and keep any unauthorized person to access our information but in our case the firewall has been modified such that it keeps the unauthorized user from sending or divulging sensitive information to someone outside the authorization policy[5]. The firewall stores the message sent by the administratoror the distributor to the agent and when that agent if he tries to send that information outside the work area via e-mal, or any other messaging service the firewall will scan the message and compare it with the message the distributor sent if the message is found consistent, an alert will be sent
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 645 to the administrator about the attempt in leaking of data (attempt because the firewall will prevent the agent to deliver the message) and the id of the agent who is responsible for the attempt[6]. After the alert has been sent the administratorcanseewhich of his agent or agents have tried to leak the information and can take actions according to his will and what the company bylaws allow, becauseiftheygounpunishedthey/he/her are most likely to try and leak data again and this time they might be successful. Fig -2:Flowchart for Agent 5.METHODOLOGY In this paper weprovide a description of all the stepsthatthe data leakage prevention strategy will follow as to not all data to be accessed by unauthorized user outside the circle to which the administrator has determined : 1. The request is sent to the distributor or the distributor may initiate the process. 2. The request may be implicate or explicate. 3. If implicate a message is generated. 4. If explicate it is checked whether he is a legitimate user to which the information can be divulged(it is chosen by the distributor whether the agent is legitimate or not). 5. The message is sent after the verification. 6. The messaged is accessed by the recipient. 7. The recipient tries to send this message to anyone outsidethe organization or the authorizedpersonal. 8. The message is scanned to see if it contains any confidential information. 9. If not the message is sent. 10. If yes, then the message is not sent and an alert is sent to the distributor. 11. The recipient is then identified and is reveled to the distributor. These are the steps that are to be followed by the data leakage prevention program as to prevent leakage and identify the culprit so as to prevent such action from happening in the future. Fig -3:Flowchart for Distributor In the prevention system the distributor or the administrator has full access the prevention system denies access to both agent and the target of the sent file from the agent outside the organization.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 646 Fig -4: Control Flow Diagram for Prevention System 6.CONCLUSION This paper help us to comprehend how much power is there in information and there are peopleinthesameorganization or company who may try to steal this information or pass it on to someone who may or may not use it to harm the organization, so we should take as many precautions as we can so that we does not end up being a victim of data leakage, and the first precaution that we need to take is to prevent the data getting leakedinthefirstplace,andbecause sometimes data will get leaked so in that case we have data leakage detection but we don't know how much damage would have been done to the clients and the company so it is best to be prepared. As firewall is to filterwhoareallowedto access the computer and what we are trying to send outside the network because of this, Data leakage prevention with the help of a firewall will help us as it will not allow anyone who does not have authorization able to send a message outside the company or organization , and if he tries he will be caught and punished. REFERENCES [1] https://en.wikipedia.org/wiki/Intrusion_detection_ system [2] http://www.iosrjournals.org/iosr-jce/papers/vol1- issue3/S0132836.pdf [3] https://www.paloaltonetworks.com/documentatio n/glossary/what-is-an-intrusion-prevention- system-ips [4] https://vxheaven.org/lib/pdf/Introducing%20Steal th %20Malware%20Taxonomy.pdf [5] https://digitalguardian.com/blog/cisos-guide-data- loss-prevention-dlp-strategy-tips-quick-wins-and- myths-avoid [6] https://www.digitalocean.com/community/tutorial s/what-is-a-firewall-and-how-does-it-work