Detecting Duplicates In Public Network Using Signatures

Download Now
Provided by: International Journal for Development of Computer Science & Technology (IJDCST)
Topic: Networking
Format: PDF
Data leakage is a silent type of threat. For example, an employee can intentionally or accidentally leak certain sensitive information. Sensitive information may be any data which an organization considers to be privileged and confidential. Hence which sensitive data that has already been leaked from the enterprise and is publicly available, for example, on the Internet should be detected. This strategy is post-facto leakage detection. Traditionally, this leakage detection is handled by watermarking, in which a unique code is embedded in each distributed copy.
Download Now

Find By Topic