2022/9/28

Data Leakage/Misuse Scenarios

Asaf Shabtai, Yuval Elovici, Lior Rokach, Asaf Shabtai, Yuval Elovici, Lior Rokach

A Survey of Data Leakage Detection and Prevention Solutions, 39-46, 2012

Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.