2016
DOI: 10.1016/j.cose.2016.02.003
|View full text |Cite
|
Sign up to set email alerts
|

A network based document management model to prevent data extrusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…This cyberattack can be in the form of DDoS on the Power Grid [24], Web attack [31], or attack the point of Sale (POS) [30]. Apart from cyberattacks, there are also External attacks [33,34], Insider Threat [35,36], Unauthorized Access [37,38], Targeted attacks [39,40], Hybrid Threats [41], Hazardous Event [42], Nature Disasters [43], Social Engineering [44], Falsification Attacks [45], Breach Attack [46], Data Theft [47], and Data Tampering [48] commonly found in CIIP. If we quote directly from the literature, vulnerability also has many terms.…”
Section: Data Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…This cyberattack can be in the form of DDoS on the Power Grid [24], Web attack [31], or attack the point of Sale (POS) [30]. Apart from cyberattacks, there are also External attacks [33,34], Insider Threat [35,36], Unauthorized Access [37,38], Targeted attacks [39,40], Hybrid Threats [41], Hazardous Event [42], Nature Disasters [43], Social Engineering [44], Falsification Attacks [45], Breach Attack [46], Data Theft [47], and Data Tampering [48] commonly found in CIIP. If we quote directly from the literature, vulnerability also has many terms.…”
Section: Data Extractionmentioning
confidence: 99%
“…There is a lack of connection between CII managers, so it is necessary to control safeguards to avoid risks. Other vulnerabilities found in the literature are Misconfigured Security Control [32,37,47], Collaborative Systems [38,52], Financial Vulnerability [30,31], Operator Mistakes [35,44], Lack Traceability [48,54], Unsecure Framework [53], Internal Turmoil [34], Unresolved Risk [42], Unknown Machine Failure [43], Manual Negotiation of Access Control [49], IoT Interconnection [45], Insecure Communication Technology [46], No Defense In-Depth [36], Sensor Misconfiguration [29], and Design Vulnerability [39].…”
Section: Data Extractionmentioning
confidence: 99%
“…Upon the DLP research topic, G. Lawton, Sultan Alneyadi, and P. Papadimitriou respectively studied on and contributed to data leakage detection, protection and prevention since 2008 [1−4] , Kamran Morovati proposed network based document management model to prevent data extrusion [5] , Xuyun Zhang et al proposed privacy leakage upper bound constraint-based approach in cloud environment [6] , G. Katz proposed a context based model for data leakage prevention [7] , J. Chavan and P. Desai studied relational data leakage detection using fake object and allocation strategies [8] , Charles Perez built up a multi-layer imbrication method for data leakage prevention from mobile devices [9] , M. Hart proposed text classification for data loss prevention [10] , A. Kumar focused on comparative evaluation of algorithms for effective data leakage detection [11] . While famous security enterprises such as McAfee [12] , Symantec [13] , Websense [14] and Chinese Security Enterprise VRV [15] , Esafenet [16] developed their DLP/ILP products for data leakage protection and prevention.…”
Section: Related Workmentioning
confidence: 99%
“…Government services with absolute protection or security control administer the latest technologies, such as cybersecurity in IoT (Chatfield and Reddick, 2019). With the definition of smart government as the CII of the government administration sector, the development of security controls (security control development) dominates the security trend in this sector (Chaisuriya et al , 2018; Khalil, 2016; Laugé et al , 2015; Morovati et al , 2016; Ravishankar et al , 2018; Rodríguez-Hoyos et al , 2019). These studies identified technology for preventive and detective functions by examining the risk and interdependency with other critical services.…”
Section: Introductionmentioning
confidence: 99%