Filters








4,069 Hits in 5.8 sec

Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users [chapter]

Anton Palazov
2011 Lecture Notes in Computer Science  
The technologies for control over the channels which can lead to data leakage protect data by whitelisting or blacklisting some devices or ports, by prohibit and allow some actions and operations, or by  ...  The technologies for data protection in case of theft or loss of computers and data devices and in case of data leakage are very important for eGovernment services users and must have appropriate properties  ...  • Integration of DLP technologies with other services like e-mail, instant messaging, Skype, social networking, etc would be a challenge and a big advantage for eGovernment services users.  ... 
doi:10.1007/978-3-642-19228-9_10 fatcat:as3nkfyhbbhybm4e2tyhph6mni

A Comparative Study of the Approach Provided for Preventing the Data Leakage

Kamaljeet Kaur, Ishu Gupta, Ashutosh Kumar Singh
2017 International journal of network security and its applications  
Data leakage poses a serious issue for companies as the number of incidents and the cost to those experiencing them continue to increase.  ...  This review paper aims to study data leakage prevention through some challenges and data protection approaches as well as considering some limitations.  ...  Companies should ensure that traffic will pass through HTTP port.  E-mail Security-In companies, grouping can be performed to prevent data leakage.  ... 
doi:10.5121/ijnsa.2017.9502 fatcat:ugpoy43w2vchrioquhnjzk33ta

Data loss prevention (DLP) by using MRSH-v2 algorithm

Basheer Husham Ali, Ahmed Adeeb Jalal, Wasseem N. Ibrahem Al-Obaydy Al-Obaydy
2020 International Journal of Electrical and Computer Engineering (IJECE)  
There are many reasons for data leakages. Internal threats such as human mistakes and external threats such as DDoS attacks are two main reasons for data loss.  ...  Exposing valuable data to others leads to severe Consequences. Customers, organizations, and /or companies lose their money and reputation due to data breaches.  ...  FTP protocol and E-mail E-mail is the most common way to send data through the internet among people around the world.  ... 
doi:10.11591/ijece.v10i4.pp3615-3622 fatcat:3zcdzs5nxjfltp7ba435b3ybvu

Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organization

Jawon Kim, Jaesoo Kim, Hangbae Chang
2020 Sustainability  
Statistical verification of the analyzed data leakage behavior is performed to determine the validity and derive the levels of leakage risk for each behavior.  ...  In addition, by applying the N-gram analysis method to derive a data leakage scenario, the levels of risk are clarified to reduce false-positives and over detection (i.e., the limitations of existing data  ...  User Behavior Profiling using Ensemble Approach for Insider Threat Detection.  ... 
doi:10.3390/su12156217 fatcat:65y4uw5bibcjzcdfoku4onkefq

An Improved Data Leak Detector for Situation Awareness Using Ant Bee Colony (ABC) Algorithm

2020 jecet  
There is an alarming rate of data leakage in most social networks and not every social media user takes data security seriously.  ...  According to Subalakshmi et al [9] , in the research titled detecting data leakage using data allocation strategies with fake objects; "the functions of businesses depend on e-mail exchange for the purpose  ...  However, data leakage detection systems cannot provide absolute protection. Thus, it is essential to discover data leakage as soon as possible.  ... 
doi:10.24214/jecet.b.9.1.07988 fatcat:ti4t7m3ycvfszg3huh443iw2lq

Implementation of Security Systems for Prevention of Loss of Information at Organizations of Higher Education

Askar Boranbayev, Mikhail Mazhitov, Zhanat Kakhanov
2015 2015 12th International Conference on Information Technology - New Generations  
The DLP system helps to analyze, control, monitor, block and protect data at the University.  ...  letter exchanges with partners and clients, academic and research data, etc...  ...  DLP system helps to analyze, monitor, track, lock and protect our data.  ... 
doi:10.1109/itng.2015.147 fatcat:nsezwsi3ibglbjdzx4iijyd5bm

NMR Application Probes a Novel and Ubiquitous Family of Enzymes That Alter Monosaccharide Configuration

Kyoung-Seok Ryu, Changhoon Kim, Insook Kim, Seokho Yoo, Byong-Seok Choi, Chankyu Park
2004 Journal of Biological Chemistry  
It was observed that the anomeric exchange of only ribofuranose, not ribopyranose, occurs spontaneously in solution rationalizing its evolutionary incorporation into the nucleic acid.  ...  The RbsD and FucU proteins share sequence homology and belong to the same protein family that is found from eubacteria to human, whereas the YiiL homologues exist in archaebacteria and lower eukaryotes  ...  ‡ ‡ To whom correspondence may be addressed. Tel.: 82-42-869-2629; Fax: 82-42-869-2610; E-mail: ckpark@kaist.ac.kr.  ... 
doi:10.1074/jbc.m402016200 pmid:15060078 fatcat:gg7ualtokfei5mo7ejoosy3qbi

Information behaving badly

Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun
2013 Proceedings of the 2013 workshop on New security paradigms workshop - NSPW '13  
We hypothesize that similar types of documents will exhibit similar workflows, and that a document deviating from its expected workflow indicates potential data leakage.  ...  Traditionally, insider threat detection has focused on observing human actors -or, more precisely, computer accounts and processes acting on behalf of those actors -to model their "normal" behavior, then  ...  Acknowledgments: This work was supported by Awards CCF-0905503, CNS-1219992, CNS-1219993, and OCI-1246061 from the National Science Foundation to the University of California at Davis.  ... 
doi:10.1145/2535813.2535825 dblp:conf/nspw/ArdBGS13 fatcat:b7jvrsacarhp3fb7td3vf2c2qq

Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication

Stephan Ludwig, Tom van Laer, Ko de Ruyter, Mike Friedman
2016 Journal of Management Information Systems  
CMC is especially vulnerable to deception, as unstructured data is exchanged through emails [6, 26] .  ...  Therefore, we were able to use the full set of e-mails and requests collected to analyze speech act cues that were not missing due to a lower level of abstraction, such as simple word use or were lacking  ... 
doi:10.1080/07421222.2016.1205927 fatcat:ytvj7zwh6zdmzh3xqc6yua3xgi

Corporate chat under DLP–system controlling

Larisa Cherckesova, Olga Safaryan, Irina Reshetnikova, Tatyana Nikishina, Denis Korochentsev, D. Rudoy, A. Olshevskaya, N. Ugrekhelidze
2021 E3S Web of Conferences  
The article describes the preparation process of software complex (package) consisting of secure corporate chat and DLP (Data Leak Prevention) system in the form of security monitor.  ...  If employees send files or e-mails to external e-mail addresses that do not correspond to their corporate e-mail addresses -there is high level of threat. 4.  ...  (users, departments, tasks, roles); -Control of the employee correspondence in the corporate chat; -Tracking the distribution path of files transmitted in the chat and e-mail; -Threat detection in the  ... 
doi:10.1051/e3sconf/202127308048 fatcat:yid53z3ogre4fncu7gxn6gkznm

Identity management-based social trust model for mediating information sharing and privacy enhancement

Mucheol Kim, Jiwan Seo, Sanghyun Noh, Sangyong Han
2011 Security and Communication Networks  
The proposed trust model contributes to increasing the opportunities for information sharing.  ...  In this paper, we propose an identity management-based social trust model for solving a sparsity problem and an information leakage.  ...  Furthermore, identity management-based social trust model can be applied to the real world applications such as recommendation system and E-mail spam detection.  ... 
doi:10.1002/sec.379 fatcat:fs7g3rj4vvgyxopnlgfhngtc2q

Automating Group Management of Large-Scale IoT Botnets for Antitracking

Pengyu Pan, Xiaobo Ma, Yingjie Fu, Feitong Chen, Weizhi Meng
2022 Security and Communication Networks  
The Diffie–Hellman key exchange method is leveraged for efficiently generating the unique group ID, thereby scaling up automatic bot grouping.  ...  To solve this problem, this paper proposes an automated approach to group management of large-scale IoT bots.  ...  Once a group of bots are mixed with honeypots, the configuration information leakage will not affect other groups. e Diffie-Hellman key exchange method is applied for automatic bot grouping, as is shown  ... 
doi:10.1155/2022/4196945 fatcat:a7kunndfmzacjhjku3gsbhayye

Sensitive Data Exposure: Data Forwarding and Storage on Cloud Environment

Shahad Alotaibi, Khadijah Alharbi, Balsam Abaalkhail, Dina M. Ibrahim
2021 International Journal of Online and Biomedical Engineering (iJOE)  
This is because the rate of attack, leakage and loss of this data has become a serious matter.  ...  The importance of sensitive data in our current era is considered our oil, as it is very important in several uses in statistical analyzes and other important matters that help the authorities to know  ...  A mysterious fingerprint system has been proposed that helps enhance the privacy of data during the detection of data leakage from private files and E-mails.  ... 
doi:10.3991/ijoe.v17i14.27365 fatcat:tzebicrgkrcxdhpdbl7dptlpu4

Methods of Machine Learning in System Abnormal Behavior Detection [chapter]

Pavel A. Savenkov, Alexey N. Ivutin
2020 Lecture Notes in Computer Science  
The aim of the research is to develop mathematical and program support for detecting abnormal behavior of users. It will be based on analysis of their behavioral biometric characteristics.  ...  This will make it possible to achieve a data analysis high quality and find complex dependencies in it.  ...  Purpose of Internal Invasions The purpose of internal intrusions is usually to gain access to textual information (financial reports, contracts, technical documentation, e-mail, etc.).  ... 
doi:10.1007/978-3-030-53956-6_45 fatcat:juqwtw42d5hajmxpf5hccncw6u

Clinician Survey to Determine Knowledge of Dengue and Clinical Management Practices, Texas, 2014

Jessica K. Adam, Roman Abeyta, Brian Smith, Linda Gaul, Dana L. Thomas, George Han, Tyler M. Sharp, Stephen H. Waterman, Kay M. Tomashek
2017 American Journal of Tropical Medicine and Hygiene  
A survey was sent to 2,375 south Texas clinicians; 217 (9%) completed the survey.  ...  Knowledge of clinical management was limited; few participants correctly identified scenarios when plasma leakage occurred (10%) or a crystalloid solution was indicated (7%); however, 45% correctly identified  ...  Data were analyzed using IBM SPSS Statistics for Windows (Version 20.0; IBM Corporation, Armonk, NY) and difference in responses among groups was analyzed using Pearson's χ 2 test.  ... 
doi:10.4269/ajtmh.16-0367 pmid:28138048 pmcid:PMC5361550 fatcat:yypddywstzf2lktnomeuyox4rm
« Previous Showing results 1 — 15 out of 4,069 results