Data loss prevention software

Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring,[1] detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage).[2]

The terms "data loss" and "data leak" are related and are often used interchangeably.[3] Data loss incidents turn into data leak incidents in cases where media containing sensitive information are lost and subsequently acquired by an unauthorized party. However, a data leak is possible without losing the data on the originating side. Other terms associated with data leakage prevention are information leak detection and prevention (ILDP), information leak prevention (ILP), content monitoring and filtering (CMF), information protection and control (IPC) and extrusion prevention system (EPS), as opposed to intrusion prevention system.

Categories

The technological means employed for dealing with data leakage incidents can be divided into categories: standard security measures, advanced/intelligent security measures, access control and encryption and designated DLP systems, although only the latter category are currently thought of as DLP today.[4] Common DLP methods for spotting malicious or otherwise unwanted activity and responding to it mechanically are automatic detection and response. Most DLP systems rely on predefined rules to identify and categorize sensitive information, which in turn helps system administrators zero in on vulnerable spots. After that, some areas could have extra safeguards installed.

Standard measures

Standard security measures, such as firewalls, intrusion detection systems (IDSs) and antivirus software, are commonly available products that guard computers against outsider and insider attacks. [5] The use of a firewall, for example, prevents the access of outsiders to the internal network and an intrusion detection system detects intrusion attempts by outsiders. Inside attacks can be averted through antivirus scans that detect Trojan horses that send confidential information, and by the use of thin clients that operate in a client-server architecture with no personal or sensitive data stored on a client device.

Advanced measures

Advanced security measures employ machine learning and temporal reasoning algorithms to detect abnormal access to data (e.g., databases or information retrieval systems) or abnormal email exchange, honeypots for detecting authorized personnel with malicious intentions and activity-based verification (e.g., recognition of keystroke dynamics) and user activity monitoring for detecting abnormal data access.

Designated DLP systems

Designated systems detect and prevent unauthorized attempts to copy or send sensitive data, intentionally or unintentionally, mainly by personnel who are authorized to access the sensitive information. In order to classify certain information as sensitive, these use mechanisms, such as exact data matching, structured data fingerprinting, statistical methods, rule and regular expression matching, published lexicons, conceptual definitions, keywords and contextual information such as the source of the data.[6]

Types

Network

Network (data in motion) technology is typically installed at network egress points near the perimeter. It analyzes network traffic to detect sensitive data that is being sent in violation of information security policies. Multiple security control points may report activity to be analyzed by a central management server.[3] A next-generation firewall (NGFW) or intrusion detection system (IDS) are common examples of technology that can be leveraged to perform DLP capabilities on the network.[7][8] Network DLP capabilities can usually be undermined by a sophisticated threat actor through the use of data masking techniques such as encryption or compression.[9]

Endpoint

Endpoint (data in use) systems run on internal end-user workstations or servers. Like network-based systems, endpoint-based technology can address internal as well as external communications. It can therefore be used to control information flow between groups or types of users (e.g. 'Chinese walls'). They can also control email and Instant Messaging communications before they reach the corporate archive, such that a blocked communication (i.e., one that was never sent, and therefore not subject to retention rules) will not be identified in a subsequent legal discovery situation. Endpoint systems have the advantage that they can monitor and control access to physical devices (such as mobile devices with data storage capabilities) and in some cases can access information before it is encrypted. Endpoint systems also have access to the information needed to provide contextual classification; for example the source or author generating content. Some endpoint-based systems provide application controls to block attempted transmissions of confidential information and provide immediate user feedback. They must be installed on every workstation in the network (typically via a DLP Agent), cannot be used on mobile devices (e.g., cell phones and PDAs) or where they cannot be practically installed (for example on a workstation in an Internet café).[10]

Cloud

The cloud now contains a lot of critical data as organizations transform to cloud-native technologies to accelerate virtual team collaboration. The data floating in the cloud needs to be protected as well since they are susceptible to cyberattacks, accidental leakage and insider threats. Cloud DLP monitors and audits the data, while providing access and usage control of data using policies. It establishes greater end-to-end visibility for all the data stored in the cloud.[11]

Data identification

DLP includes techniques for identifying confidential or sensitive information. Sometimes confused with discovery, data identification is a process by which organizations use a DLP technology to determine what to look for.

Data is classified as either structured or unstructured. Structured data resides in fixed fields within a file such as a spreadsheet, while unstructured data refers to free-form text or media in text documents, PDF files and video.[12] An estimated 80% of all data is unstructured and 20% structured.[13]

Data loss protection (DLP)

Sometimes a data distributor inadvertently or advertently gives sensitive data to one or more third parties, or uses it themselves in an authorized fashion. Sometime later, some of the data is found in an unauthorized place (e.g., on the web or on a user's laptop). The distributor must then investigate the source of the loss.

Data at rest

"Data at rest" specifically refers to information that is not moving, i.e. that exists in a database or a file share. This information is of great concern to businesses and government institutions simply because the longer data is left unused in storage, the more likely it might be retrieved by unauthorized individuals. Protecting such data involves methods such as access control, data encryption and data retention policies.[3]

Data in use

"Data in use" refers to data that the user is currently interacting with. DLP systems that protect data in-use may monitor and flag unauthorized activities.[3] These activities include screen-capture, copy/paste, print and fax operations involving sensitive data. It can be intentional or unintentional attempts to transmit sensitive data over communication channels.

Data in motion

"Data in motion" is data that is traversing through a network to an endpoint. Networks can be internal or external. DLP systems that protect data in-motion monitor sensitive data traveling across a network through various communication channels.[3]

See also

References

  1. ^ Hayes, Read (2007), "Data Analysis", Retail Security and Loss Prevention, Palgrave Macmillan UK, pp. 137–143, doi:10.1057/9780230598546_9, ISBN 978-1-349-28260-9
  2. ^ "What is Data Loss Prevention (DLP)? A Definition of Data Loss Prevention". Digital Guardian. 2020-10-01. Retrieved 2020-12-05.
  3. ^ a b c d e Asaf Shabtai, Yuval Elovici, Lior Rokach, A Survey of Data Leakage Detection and Prevention Solutions, Springer-Verlag New York Incorporated, 2012
  4. ^ Phua, C., Protecting organisations from personal data breaches, Computer Fraud and Security, 1:13-18, 2009
  5. ^ BlogPoster (2021-05-13). "Standard vs Advanced Data Loss Prevention (DLP) Measures: What's the Difference". Logix Consulting Managed IT Support Services Seattle. Retrieved 2022-08-28.
  6. ^ Ouellet, E., Magic Quadrant for Content-Aware Data Loss Prevention, Technical Report, RA4 06242010, Gartner RAS Core Research, 2012
  7. ^ "What Is a Next-Generation Firewall (NGFW)?". Cisco. 2022-01-02. Archived from the original on 2022-11-05. Retrieved 2023-01-02.
  8. ^ "What is Data Loss Prevention (DLP)? [Beginners Guide] | CrowdStrike". CrowdStrike. 2022-09-27. Archived from the original on 2022-12-06. Retrieved 2023-01-02.
  9. ^ Seltzer, Larry (2019-03-18). "3 ways to monitor encrypted network traffic for malicious activity". CSO Online. Archived from the original on 2022-09-20. Retrieved 2023-01-02.
  10. ^ "Group Test: DLP" (PDF). SC Magazine. March 2020. Archived from the original (PDF) on 2021-09-07. Retrieved September 7, 2021.
  11. ^ Pasquier, Thomas; Bacon, Jean; Singh, Jatinder; Eyers, David (2016-06-06). "Data-Centric Access Control for Cloud Computing". Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies. SACMAT '16. New York, NY, USA: Association for Computing Machinery. pp. 81–88. doi:10.1145/2914642.2914662. ISBN 978-1-4503-3802-8. S2CID 316676.
  12. ^ "PC Mag - Unstructured Data". Computer Language Co. 2024. Retrieved 14 January 2024.
  13. ^ Brian E. Burke, “Information Protection and Control survey: Data Loss Prevention and Encryption trends,” IDC, May 2008

Read other articles:

Datuk Siamang GagapSampul buku Pendekar Siamang Gagap.LahirAbdul Qahar bin Mukmin1817 Kampung Repah, Tampin, Negeri Sembilan, Semenanjung MalayaMeninggal Kampung Terusan Juasseh, Malaya BritaniaKebangsaan Negeri Sembilan ( dari suku Seri Semelenggang )Nama lainPendekar Siamang GagapPekerjaanPembesar IstanaDikenal atasPanglima Perang Bukit Putus Abdul Qahar bin Mukmin yang lebih dikenal dengan nama Datuk Siamang Gagap atau Pendekar Siamang Gagap (lahir di Kampung Repah, Tampin, Negeri Se...

 

 

Gunung Hiei比叡山Pemandangan dari Kyoto dengan pohon-pohon sakura. (April 2005)Titik tertinggiKetinggian8.481 m (27.825 ft)Masuk dalam daftarDaftar gunung dan bukit di Jepang menurut ketinggianKoordinat35°4′0″N 135°50′18″E / 35.06667°N 135.83833°E / 35.06667; 135.83833Koordinat: 35°4′0″N 135°50′18″E / 35.06667°N 135.83833°E / 35.06667; 135.83833 GeografiLetakHonshū, Prefektur Shiga, JepangPeta topograf...

 

 

Kakap belang kuning Lutjanus adetii Status konservasiRisiko rendahIUCN194399 TaksonomiKerajaanAnimaliaFilumChordataKelasActinopteriOrdoLutjaniformesFamiliLutjanidaeGenusLutjanusSpesiesLutjanus adetii Castelnau, 1873 lbs Lutjanus adetii, kakap belang kuning adalah spesies ikan laut bersirip pari, kakap yang termasuk dalam famili Lutjanidae . Ia berasal dari barat daya Lautan Pasifik. Spesies ini tidak terlalu penting bagi perikanan komersial lokal dan banyak dicari sebagai ikan buruan . Ketera...

1814–1815 meetings to create a peace plan for Europe For other uses, see Congress of Vienna (disambiguation). Vienna peace congress redirects here. For the 2015 congress on Syria, see Vienna peace talks for Syria. This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Congress of Vienna – news · newspapers · books · sc...

 

 

MezzettaCompany typePrivateFounderGiuseppe Luigi MezzettaHeadquartersAmerican Canyon, California, United StatesArea servedCaliforniaProductsolives, pickled peppers, pasta saucesOwnerJeff MezzettaWebsitemezzetta.com G. L. Mezzetta, Inc., commonly known as Mezzetta, is a California food processor that packs olives, pickled peppers and other pickled vegetables in glass jars for retail sale. They also pack and sell wine-based pasta sauces under the Napa Valley Bistro brand name. The privately hel...

 

 

MacArthurPoster rilis layar lebarSutradaraJoseph SargentProduserFrank McCarthyDitulis olehHal BarwoodMatthew RobbinsPemeranGregory PeckEd FlandersDan O'HerlihyPenata musikJerry GoldsmithSinematograferMario TosiPenyuntingGeorge Jay NicholsonDistributorUniversal PicturesTanggal rilis 15 Juli 1977 (1977-07-15) Durasi130 menitNegaraAmerika SerikatBahasaInggrisAnggaran$9 juta[1]Pendapatankotor$16,320,000 (AS)[2] MacArthur adalah sebuah film perang biografi Amerika 1977. ...

Türkiye 1.Lig 1984-1985 Competizione Türkiye 1.Lig Sport Calcio Edizione 27ª Organizzatore TFF Luogo  Turchia Partecipanti 18 Formula Girone unico Sito web tff.org Risultati Vincitore  Fenerbahçe(11º titolo) Retrocessioni  Antalyaspor Boluspor Statistiche Miglior marcatore Aykut Yiğit (20) Incontri disputati 306 Gol segnati 686 (2,24 per incontro) Cronologia della competizione 1983-84 1985-86 Manuale L'edizione 1984-1985 della Türkiye 1.Lig vide la vittor...

 

 

Disambiguazione – Se stai cercando la medesima competizione per altri sport, vedi Coppa Libertadores 2017 (disambigua). Coppa Libertadores 2017Copa Bridgestone Libertadores de América 2017 Competizione Coppa Libertadores Sport Calcio Edizione 58ª Organizzatore CONMEBOL Date 23 gennaio 2017 - 30 novembre 2017 Partecipanti 47 Nazioni 10 Risultati Vincitore  Grêmio(3º titolo) Secondo  Lanús Semi-finalisti  River Plate Barcelona SC Statistiche Miglior giocatore Lu...

 

 

See also: Maszkowice, Lesser Poland Voivodeship Village in Łódź Voivodeship, PolandMaszkowiceVillageMaszkowiceCoordinates: 51°58′10″N 19°19′36″E / 51.96944°N 19.32667°E / 51.96944; 19.32667Country PolandVoivodeshipŁódźCountyZgierzGminaOzorków Maszkowice [maʂkɔˈvit͡sɛ] is a village in the administrative district of Gmina Ozorków, within Zgierz County, Łódź Voivodeship, in central Poland.[1] It lies approximately 3 kilometres (2&#...

Перуанский анчоус Научная классификация Домен:ЭукариотыЦарство:ЖивотныеПодцарство:ЭуметазоиБез ранга:Двусторонне-симметричныеБез ранга:ВторичноротыеТип:ХордовыеПодтип:ПозвоночныеИнфратип:ЧелюстноротыеГруппа:Костные рыбыКласс:Лучепёрые рыбыПодкласс:Новопёрые �...

 

 

The equestrian statue of Charles I, with Nelson's Column and the National Gallery in the background. This is a list of public art in and around Trafalgar Square in the City of Westminster, London. Charing Cross, at the junction of Strand and Whitehall, was the site of the first public monument in what is now the City of Westminster,[1] the cross commissioned by Edward I late in the 13th century in memory of his queen, Eleanor of Castile. Destroyed by order of the Long Parliament in 1...

 

 

Municipality in Northeast, BrazilSão Francisco do Conde Município de São Francisco do CondeMunicipality SealLocation of São Francisco do Conde in BahiaSão Francisco do CondeLocation of São Francisco do Conde in BrazilCoordinates: 12°39′S 38°41′W / 12.650°S 38.683°W / -12.650; -38.683Country BrazilRegionNortheastState BahiaFounded1697Government • MayorEvandro Almeida1 (2013–2016)Area • Total262.856 km2 (101.489 sq&#...

Bridge in Adana, TurkeyÇatalan BridgeThe Çatalan (West) Bridge crossing Seyhan Dam Lake, seen from the southCoordinates37°04′38″N 35°16′27″E / 37.0771°N 35.2742°E / 37.0771; 35.2742Carries2 lanes of Göl Kenarı RoadCrossesSeyhan DamLocaleAdana, TurkeyOfficial nameÇatalan KöprüsüMaintained byKarayolları Genel MüdürlüğüCharacteristicsMaterialReinforced concreteTotal length1575 mHistoryConstruction start1998Construction end2002Opened17 June 2002Lo...

 

 

 烏克蘭總理Прем'єр-міністр України烏克蘭國徽現任杰尼斯·什米加尔自2020年3月4日任命者烏克蘭總統任期總統任命首任維托爾德·福金设立1991年11月后继职位無网站www.kmu.gov.ua/control/en/(英文) 乌克兰 乌克兰政府与政治系列条目 宪法 政府 总统 弗拉基米尔·泽连斯基 總統辦公室 国家安全与国防事务委员会 总统代表(英语:Representatives of the President of Ukraine) 总...

 

 

Saharjo Menteri Kehakiman Indonesia ke-11Masa jabatan10 Juli 1959 – 13 November 1963PresidenSoekarnoPerdana MenteriSoekarnoPendahuluGustaaf Adolf MaengkomPenggantiAstrawinata Informasi pribadiLahir(1909-06-26)26 Juni 1909Solo, Hindia BelandaMeninggal13 November 1963(1963-11-13) (umur 54)Jakarta, IndonesiaKebangsaanIndonesiaProfesiPahlawan Nasional, Menteri hukum dan HAMSunting kotak info • L • B Dr. Sahardjo, S.H. (26 Juni 1909 – 13 November 1...

Federal political party People's Party of Canada Parti populaire du CanadaAbbreviationPPCLeaderMaxime BernierFounderMaxime BernierFoundedSeptember 14, 2018; 5 years ago (2018-09-14)Split fromConservative Party of CanadaHeadquartersGatineau, Quebec, CanadaYouth wingNew Generation PPCMembership (2021) 30,000[1]IdeologyConservatismRight-libertarianismRight-wing populismPolitical positionRight-wing to far-rightColours  PurpleSenate0 / 105House of Commons0 ...

 

 

Dutch politician (born 1994) This biography of a living person needs additional citations for verification. Please help by adding reliable sources. Contentious material about living persons that is unsourced or poorly sourced must be removed immediately from the article and its talk page, especially if potentially libelous.Find sources: Carline van Breugel – news · newspapers · books · scholar · JSTOR (November 2023) (Learn how and when to remove this ...

 

 

2020 court case on NSA telephone surveillance United States v. MoalinCourtUnited States Court of Appeals for the Ninth CircuitDecidedSeptember 2, 2020Court membershipJudge(s) sittingMarsha Berzon, Jacqueline Nguyen, Jack Zouhary National Security Agency surveillanceMap of global NSA data collection as of 2007[update], with countries subject to the most data collection shown in red Programs Pre-1978 ECHELON MINARET SHAMROCK PROMIS Since 1978 Upstream collection BLARNEY FAIRVIEW Main Co...

Dutch footballer (born 2006) Jorrel Hato Hato playing for Ajax in 2024Personal informationDate of birth (2006-03-07) 7 March 2006 (age 18)Place of birth Rotterdam, NetherlandsHeight 1.82 m (6 ft 0 in)Position(s) Centre-back, left-backTeam informationCurrent team AjaxNumber 4Youth career0000–2018 Sparta Rotterdam2018–2022 AjaxSenior career*Years Team Apps (Gls)2022– Jong Ajax 13 (1)2022– Ajax 44 (1)International career‡2021–2022 Netherlands U16 6 (0)2022–2023 ...

 

 

1ª Divisão 1951 Competizione 1ª Divisão Sport hockey su pista Edizione 13ª Organizzatore FPP Date dal 13 maggioal 10 dicembre 1951 Luogo  Portogallo Partecipanti 17 Formula Due gironi eliminatori + girone finale Risultati Vincitore  Benfica(1º titolo) Retrocessioni  Colegio Militar Cronologia della competizione 1950 1952 Manuale La 1ª Divisão 1951 è stata la 13ª edizione del torneo di primo livello del campionato portoghese di hockey su pista. La manifestazio...