IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
Now days, every company is facing data leakage. That is very serious problem faced by company. An owner of enterprise has given confidential data to its employee but most of the time employee leaks the data. That leak data found in illegal place such as on the web of comparator enterprise or on laptop of employee of comparator enterprise or the owner of Comparators Company’s laptop. It May or may not be observed by owner. Leak data may be basic code or design provision, cost lists, rational property and copy rights data, trade secrets, forecasts and budgets. In this case the data leaked out it leaves the company goes in undefended the authority of the corporation. This uninhibited data leakage puts business in a back in position. To find the solution on this problem we develop two models. First, when any employee of enterprise access confidential data without the consent of owner in that case ,we developed data watcher model to identifying data leaker and suppose employee given data outside the enterprise for that we devolved second model for assessing the “guilt†of agents. Guilt model are used to improve the probability of identifying guilty third parties.
Authors and Affiliations
N. P. Jagtap, S. J. Patil, A. K. Bhavsar
Performance Evaluation of VoIP in MPLS network using NS-2
To evaluate and enhance the performance of the High-Speed Data networks some study on network technology is required to be done, it also require to simulate and verify the results and suggests the better solutions for Hi...
Performance of Modified Silicon-Based Optical Leaky-Wave Antenna Structures
Conventional silicon-based optical leaky-wave antennas (OLWAs) have been investigated in the literature as high directivity narrow-beam radiators with steering capability and designed for 1550 nm operation using single-g...
An Analysis of the PROMISE and ISBSG Software Engineering Data Repositories
There exist two ongoing large repositories of software projects in the software engineering community: the repository of the International Software Benchmarking Standards Group (ISBSG) and the Repository referred to as P...
Integration of GPS with Digital devices and Interactive objects for public safety.
Abstract: The paper demonstrated the role of GPS technology in law enforcement and public safety application areas. It presents the design, implem...
HYBRID APPROACH USING MOBILE SINK AND FUZZY LOGIC FOR REGION BASED CLUSTERING IN WSN
Wireless sensor network has revolutionized the way computing and software services are delivered to the clients on demand. Wireless sensor network is very important to the mankind. It consist of number of sensor called n...