2008 Second International Conference on Emerging Security Information, Systems and Technologies 2008
DOI: 10.1109/securware.2008.14
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Insider Information Leakage for Enterprises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Several proposals aiming at the detection of database security incidents can be found in the literature, and in particular in the field of anomaly detection [3,4,5,6,7,10,36,37]. Various techniques have been proposed to detect anomalies [8].…”
Section: Related Workmentioning
confidence: 99%
“…Several proposals aiming at the detection of database security incidents can be found in the literature, and in particular in the field of anomaly detection [3,4,5,6,7,10,36,37]. Various techniques have been proposed to detect anomalies [8].…”
Section: Related Workmentioning
confidence: 99%
“…Several works aiming at data leakage detection and protection can be found in the literature [8][9][10]. Data leakage detection (DLD) solutions differ in the approach and technologies used to detect leakages.…”
Section: Related Workmentioning
confidence: 99%
“…The 'Top 10 Guide' for protecting sensitive data from malicious insiders [4] also stated that database security is one of the most critical areas that need sensitive data protection from insiders because it saves attractive information desired by insiders. Insiders are capable of saving data on USB memory sticks and portable disks, and they can illegally use the data from outside by bypassing the firewall, the intrusion detection system (IDS), and the monitoring system at a later time [5]. Insider threats are considered as one of the greatest threats to information security as organizations are becoming more dependent on enterprise information systems.…”
Section: Introductionmentioning
confidence: 99%
“…Data leakage protection techniques were mainly based on a firewall, DLP, DRM, and encryption. However, traditional security techniques are not effective for detecting the leakage of internal information by malicious insiders with legitimate access authorization [5]. Therefore, we attempted to apply a new approach to the detection method.…”
Section: Introductionmentioning
confidence: 99%