Skip to main content
  • Book
  • © 2012

A Survey of Data Leakage Detection and Prevention Solutions

Part of the book series: SpringerBriefs in Computer Science (BRIEFSCOMPUTER)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (8 chapters)

  1. Front Matter

    Pages i-viii
  2. Introduction to Information Security

    • Asaf Shabtai, Yuval Elovici, Lior Rokach
    Pages 1-4
  3. Data Leakage

    • Asaf Shabtai, Yuval Elovici, Lior Rokach
    Pages 5-10
  4. A Taxonomy of Data Leakage Prevention Solutions

    • Asaf Shabtai, Yuval Elovici, Lior Rokach
    Pages 11-15
  5. Data Leakage Detection/Prevention Solutions

    • Asaf Shabtai, Yuval Elovici, Lior Rokach
    Pages 17-37
  6. Data Leakage/Misuse Scenarios

    • Asaf Shabtai, Yuval Elovici, Lior Rokach
    Pages 39-46
  7. Privacy, Data Anonymization, and Secure Data Publishing

    • Asaf Shabtai, Yuval Elovici, Lior Rokach
    Pages 47-68
  8. Case studies

    • Asaf Shabtai, Yuval Elovici, Lior Rokach
    Pages 69-82
  9. Future Trends in Data Leakage

    • Asaf Shabtai, Yuval Elovici, Lior Rokach
    Pages 83-85
  10. Back Matter

    Pages 87-92

About this book

SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages (approximately 20,000- 40,000 words), the series covers a range of content from professional to academic. Briefs allow authors to present their ideas and readers to absorb them with minimal time investment. As part of Springer’s eBook collection, SpringBriefs are published to millions of users worldwide. Information/Data Leakage poses a serious threat to companies and organizations, as the number of leakage incidents and the cost they inflict continues to increase. Whether caused by malicious intent, or an inadvertent mistake, data loss can diminish a company’s brand, reduce shareholder value, and damage the company’s goodwill and reputation. This book aims to provide a structural and comprehensive overview of the practical solutions and current research in the DLP domain. This is the first comprehensive book that is dedicated entirely to the field of data leakage and covers all important challenges and techniques to mitigate them. Its informative, factual pages will provide researchers, students and practitioners in the industry with a comprehensive, yet concise and convenient reference source to this fascinating field. We have grouped existing solutions into different categories based on a described taxonomy. The presented taxonomy characterizes DLP solutions according to various aspects such as: leakage source, data state, leakage channel, deployment scheme, preventive/detective approaches, and the action upon leakage. In the commercial part we review solutions of the leading DLP market players based on professional research reports and material obtained from the websites of the vendors. In the academic part we cluster the academic work according to the nature of the leakage and protection into various categories. Finally, we describe main data leakage scenarios and present for eachscenario the most relevant and applicable solution or approach that will mitigate and reduce the likelihood and/or impact of the leakage scenario.

Reviews

From the reviews:

“‘Springer Briefs’ is a series of short books to help information and communications technology (ICT) professionals learn about new or unfamiliar technologies. This work is from that series, providing an introduction to the detection of corporate data loss and leaks. … the book amounts to a good, concise brief for quickly coming to grips with the basics of protecting corporate data from leakage and loss. … There is a good table of contents and a thorough list of references.” (David B. Henderson, ACM Computing Reviews, September, 2012)

Authors and Affiliations

  • , Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel

    Asaf Shabtai, Yuval Elovici, Lior Rokach

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access