Abstract
Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 The Author(s)
About this chapter
Cite this chapter
Shabtai, A., Elovici, Y., Rokach, L. (2012). Data Leakage/Misuse Scenarios. In: A Survey of Data Leakage Detection and Prevention Solutions. SpringerBriefs in Computer Science. Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-2053-8_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-2053-8_5
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4614-2052-1
Online ISBN: 978-1-4614-2053-8
eBook Packages: Computer ScienceComputer Science (R0)