Items related to Data Leakage Detection and Prevention for Data Security

Data Leakage Detection and Prevention for Data Security - Softcover

 
9781835800591: Data Leakage Detection and Prevention for Data Security

This specific ISBN edition is currently not available.

Synopsis

1. Introduction to Data Security

The National-Institute-of-Standards-and-Technology (

NIST) explains term

data-security as a way for "protection afforded to an automated information

system in order to attain the applicable objectives of preserving the integrity,

availability, and confidentiality of information system resources (includes

hardware, software, firmware, information/data, and telecommunications)" [1]

[2].

1.1

Wireless networks are growing faster and are gaining popularity in almost

every industry since their appearance in around late 1970s. Moreover, in last

decade WN has got wings and is growing at a tremendous pace as wireless

network have enabled the industries with most promising things the mobility

and the data accessibility over electronic media/platforms. Data is now availa-

ble in fraction of seconds worldwide regardless of any geographical

boundations. On the top of all it is reasonable and approachable to masses

with ease [3] [4] [5].

This existing scenario of rapid network growth enabled the sharing of sensi-

tive data of any entity among diverse stakeholders within or outside the organ-

ization premises for analyzing purpose. This sharing of confidential data

among multiple entities; enhances the chances that sensitive information later

can be found at some unauthorized location as the data receiver might have

misused the data. Also, recipient of data even may leak it either for intentional

or an unintentional reasons. Restricted access to the confidential data may

hamper organization's growth and performance.

1. Introduction to Data Security

The National-Institute-of-Standards-and-Technology (

NIST) explains term

data-security as a way for "protection afforded to an automated information

system in order to attain the applicable objectives of preserving the integrity,

availability, and confidentiality of information system resources (includes

hardware, software, firmware, information/data, and telecommunications)" [1]

[2].

1.1

Wireless networks are growing faster and are gaining popularity in almost

every industry since their appearance in around late 1970s. Moreover, in last

decade WN has got wings and is growing at a tremendous pace as wireless

network have enabled the industries with most promising things the mobility

and the data accessibility over electronic media/platforms. Data is now availa-

ble in fraction of seconds worldwide regardless of any geographical

boundations. On the top of all it is reasonable and approachable to masses

with ease [3] [4] [5].

This existing scenario of rapid network growth enabled the sharing of sensi-

tive data of any entity among diverse stakeholders within or outside the organ-

ization premises for analyzing purpose. This sharing of confidential data

among multiple entities; enhances the chances that sensitive information later

can be found at some unauthorized location as the data receiver might have

misused the data. Also, recipient of data even may leak it either for intentional

or an unintentional reasons. Restricted access to the confidential data may

hamper organization's growth and performance.

"synopsis" may belong to another edition of this title.

(No Available Copies)

Search Books:



Create a Want

Can't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!

Create a Want