info@buecher-doppler.ch
056 222 53 47
Warenkorb
Ihr Warenkorb ist leer.
Gesamt
0,00 CHF
  • Start
  • Data Leakage Detection and Prevention for Data Security

Data Leakage Detection and Prevention for Data Security

Angebote / Angebote:

1. Introduction to Data Security The National-Institute-of-Standards-and-Technology ( NIST) explains term data-security as a way for "protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)" [1] [2]. 1.1 Wireless networks are growing faster and are gaining popularity in almost every industry since their appearance in around late 1970s. Moreover, in last decade WN has got wings and is growing at a tremendous pace as wireless network have enabled the industries with most promising things the mobility and the data accessibility over electronic media/platforms. Data is now availa- ble in fraction of seconds worldwide regardless of any geographical boundations. On the top of all it is reasonable and approachable to masses with ease [3] [4] [5]. This existing scenario of rapid network growth enabled the sharing of sensi- tive data of any entity among diverse stakeholders within or outside the organ- ization premises for analyzing purpose. This sharing of confidential data among multiple entities, enhances the chances that sensitive information later can be found at some unauthorized location as the data receiver might have misused the data. Also, recipient of data even may leak it either for intentional or an unintentional reasons. Restricted access to the confidential data may hamper organization's growth and performance. 1. Introduction to Data Security The National-Institute-of-Standards-and-Technology ( NIST) explains term data-security as a way for "protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)" [1] [2]. 1.1 Wireless networks are growing faster and are gaining popularity in almost every industry since their appearance in around late 1970s. Moreover, in last decade WN has got wings and is growing at a tremendous pace as wireless network have enabled the industries with most promising things the mobility and the data accessibility over electronic media/platforms. Data is now availa- ble in fraction of seconds worldwide regardless of any geographical boundations. On the top of all it is reasonable and approachable to masses with ease [3] [4] [5]. This existing scenario of rapid network growth enabled the sharing of sensi- tive data of any entity among diverse stakeholders within or outside the organ- ization premises for analyzing purpose. This sharing of confidential data among multiple entities, enhances the chances that sensitive information later can be found at some unauthorized location as the data receiver might have misused the data. Also, recipient of data even may leak it either for intentional or an unintentional reasons. Restricted access to the confidential data may hamper organization's growth and performance.
Folgt in ca. 10 Arbeitstagen

Preis

42,50 CHF