Data Leakage/Misuse Scenarios

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.

Original languageAmerican English
Title of host publicationSpringerBriefs in Computer Science
Place of PublicationBoston, MA
PublisherSpringer
Pages39-46
Number of pages8
ISBN (Electronic)978-1-4614-2053-8
ISBN (Print)978-1-4614-2052-1
DOIs
StatePublished - 1 Jan 2012

Publication series

NameSpringerBriefs in Computer Science
Number9781461420521
Volume0

Keywords

  • Honeypot
  • Leak Incidence
  • Third-party Location
  • Unintentional Cases
  • Unintentional Leakage

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'Data Leakage/Misuse Scenarios'. Together they form a unique fingerprint.

Cite this