An Elicitation Technique for Handling Data Malicious Activity

Download Now
Provided by: International Journal for Development of Computer Science & Technology (IJDCST)
Topic: Big Data
Format: PDF
Mitigating leakage or misuse incidents of data stored in databases (i.e., tabular data) by an insider having legitimate privileges to access the data is a challenging task. Assigning a misusability weight to a given dataset is strongly related to the way the data is presented (e.g., tabular data, structured or free text) and is domain specific. Applying anomaly detection by learning the normal behavior of an insider in terms of the sensitivity level of the data the user is usually exposed to Improving the process of handling leakage incidents identified by other misuse detection systems by enabling the security officer to focus on incidents involving more sensitive data.
Download Now

Find By Topic