Abstract
Most of the biggest financial or insurance companies in the world that deal with critical client information are now considering introducing a Data Leakage Protection(DLP) system in order to reduce the risk of data loss. However, there is no standard for the introduction of a DLP system, which leads to companies still having the problem of information leakage even after the introduction. This paper analyzes various channels of information leakage and suggests a protection profile based on the CC V3.1 to help develop and introduce a DLP system that can prevent in-house information leakage.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2011-0026023).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lee, S., Shin, M.: Protection Profile for Software Development Site. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005, Part II. LNCS, vol. 3481, pp. 499–507. Springer, Heidelberg (2005)
Kanagasinghan, P.: Data Loss Prevention: SANS Institute InfoSec Reading Room (August 2008)
A Trend Micro White Paper: Addressing compliance Requirements for Privacy, Data Retention, and e-Discovery (March 2009)
The necessity of DLP Solutions: Osterman Research White Paper (June 2010)
SANS Institute: Understanding and Selecting a Data Loss Prevention Solution
IRONPORT SYSTMES with A Foreword By BRADLEY R. HUNTER: Data Loss Prevention Best Practices, Managing Sensitive Data in the Enterprise: A Message Media Publication
21CSOFT; McAfee Total Protection for Data
McAfee; Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 Security Target Document Version 0.6 (December 2010)
RSA: The Security Division of EMC RSA® Data Loss Prevention Suite v6.5 Security Target Document Version 0.7 (April 2009)
Aberdeen Group: The Cost-Based Business Case for DLP(June 2009)
RSA: RSA Solution Brief
Symantec, http://www.symantec.com
TREND MICRO, http://www.trendmicro.com
RSA, http://www.rsa.com
BlueCoat, http://www.bluecoat.com
Componentshop, http://www.componentshop.co.kr/isrc/mp/2009/08/dlp/dlp_01.html
WIKIPEDIA, http://en.wikipedia.org/wiki/DLP
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, HJ., Won, D. (2011). Protection Profile for Data Leakage Protection System. In: Kim, Th., et al. Future Generation Information Technology. FGIT 2011. Lecture Notes in Computer Science, vol 7105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27142-7_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-27142-7_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27141-0
Online ISBN: 978-3-642-27142-7
eBook Packages: Computer ScienceComputer Science (R0)