Abstract
This chapter presents three case studies in the data leakage domain and the methods proposed and evaluated for mitigating the threat of data leakage. The case studies are: detecting an insider attempting to misuse and leak data stored in a database system; using honeytokens to detect insider threats; and detecting leakage through email.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Carvalho, V.R., and Cohen, W. 2007. Preventing information leaks in email. Proceedings, SIAM International Conference on Data Mining.
Duncan, K., and Wells, D. 1999. Rule-based data cleansing. Journal of Data Warehousing, 4(3), 2–15.
Zilberman, P., Katz., G., Elovici, Y., Shabtai, A. and Dolev, S., 2011. Analyzing group communication for preventing data leakage via email. Proceedings, IEEE Intelligence and Security Informatics (ISI 2011), Beijing, China, July 10–12, 2011.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 The Author(s)
About this chapter
Cite this chapter
Shabtai, A., Elovici, Y., Rokach, L. (2012). Case studies. In: A Survey of Data Leakage Detection and Prevention Solutions. SpringerBriefs in Computer Science. Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-2053-8_7
Download citation
DOI: https://doi.org/10.1007/978-1-4614-2053-8_7
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4614-2052-1
Online ISBN: 978-1-4614-2053-8
eBook Packages: Computer ScienceComputer Science (R0)