Data Leakage and Detection of Guilty Agent

Provided by: International Journal of Scientific & Engineering Research
Topic: Data Management
Format: PDF
Organizations apply data or information security only in terms of protecting their network from intruders (e.g. hackers) but with growing amount of sensitive data and rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points (machines and servers) and easier modes of communication, sometime accidental or even deliberate leakage of data from within the organization has become a painful reality. This paper has lead to growing awareness about sensitive data security in general and about outbound content management in particular.

Find By Topic