Data theft: Difference between revisions

Content deleted Content added
remove copyright content copied from http://docplayer.net/52423978-Insider-attack-and-cyber-security-beyond-the-hacker.html
Line 19:
*The cost of high-capacity portable USB storage devices has decreased.
*Networks have grown more dispersed, the number of remote network access points has increased and methods of network connection have expanded, increasing the number of vectors for network infiltration.
After the downloading data, data will be sold in black market.
 
 
'''Data Leakage'''
 
Data leak is part of insider attack that accidental or unintentional data loss because of specific circuit stances.<ref>{{Cite book|last=Stolfo|first=salvatore|title=Insider Attack and Cyber Security Beyond the Hacker|publisher=Springer US|year=2008|isbn=|location=Boston, MA|pages=}}</ref>
 
==Investigating data theft==
Techniques to investigate data theft include [[stochastic forensics]], [[digital artifact]] analysis (especially of [[USB flash drive|USB drive]] artifacts), and other [[computer forensics]] techniques.
 
DLP/ILP Suits are commercial security tools that investigate the data theft and prevent data movements to others
 
== Terminology ==