Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 1743 Accesses

Abstract

This chapter presents three case studies in the data leakage domain and the methods proposed and evaluated for mitigating the threat of data leakage. The case studies are: detecting an insider attempting to misuse and leak data stored in a database system; using honeytokens to detect insider threats; and detecting leakage through email.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.cs.cmu.edu/~enron/

References

  • Carvalho, V.R., and Cohen, W. 2007. Preventing information leaks in email. Proceedings, SIAM International Conference on Data Mining.

    Google Scholar 

  • Duncan, K., and Wells, D. 1999. Rule-based data cleansing. Journal of Data Warehousing, 4(3), 2–15.

    Google Scholar 

  • Zilberman, P., Katz., G., Elovici, Y., Shabtai, A. and Dolev, S., 2011. Analyzing group communication for preventing data leakage via email. Proceedings, IEEE Intelligence and Security Informatics (ISI 2011), Beijing, China, July 10–12, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 The Author(s)

About this chapter

Cite this chapter

Shabtai, A., Elovici, Y., Rokach, L. (2012). Case studies. In: A Survey of Data Leakage Detection and Prevention Solutions. SpringerBriefs in Computer Science. Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-2053-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-2053-8_7

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4614-2052-1

  • Online ISBN: 978-1-4614-2053-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics