Skip to Main Content
Data leakage can be elaborated as in when a data distributor has given sensitive data to a set of supposedly trusted agents and some of the data is leaked and found in an unauthorized place. An enterprise data leak is a scary proposition. Security practitioners have always had to deal with data leakage issues that arise from various ways like e-mail, IM and other Internet channels. In case of data leakage from trusted agents, the distributor must assess the likelihood that the leaked data came from one or more agents. This can be done by using a system which can identify those parties who are guilty for such leakage even when data is altered. For this the system can use data allocation strategies or can also inject “realistic but fake” data records to improve identification of leakage. Moreover, data can also be leaked from within an organization through e-mails. Hence, there is also a need to filter these e-mails. This can be done by blocking e-mails which contains images, videos or sensitive data for an organization. Principle used in e-mail filtering is we classify e-mail based the fingerprints of message bodies, the white and black lists of email addresses and the words specific to spam.