Skip to main content

Data Loss Prevention in Real Life

  • Chapter
  • First Online:
ISSE 2012 Securing Electronic Business Processes
  • 1281 Accesses

Abstract

Stuxnet, PDF-exploits, Flame, tax CDs and Liechtenstein – there are various threats out there in the real world. And they all have one thing in common: the attacks are far from being trivial offence but are pursuing clear economical or even political goals. Government agencies and businesses are equally exposed to attacks on IT systems and sensitive data. How to protect yourself and your company against data theft and other prevailing risks, is subject to the following article.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thorsten Scharmatinat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Scharmatinat, T. (2012). Data Loss Prevention in Real Life. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_1

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics