V. Vijayalakshmi, T. Rohini, S. Sujatha, A. Vishali
{"title":"Survey on detecting leakage of sensitive data","authors":"V. Vijayalakshmi, T. Rohini, S. Sujatha, A. Vishali","doi":"10.1109/STARTUP.2016.7583916","DOIUrl":null,"url":null,"abstract":"Network security is a method used to prevent the unauthorized access or modification on computer network. Information security is the process of guarding the confidential data from the unlicensed users. Data leakage happens when a system is designed to be closed to a listener reveals some information to unauthorized parties on the other hand. In this paper we proposed the survey about recent research techniques issued for detecting data leakages in a novel way. It emphasis the classification of the existing literature, developing perspective and evaluating trend.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STARTUP.2016.7583916","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Network security is a method used to prevent the unauthorized access or modification on computer network. Information security is the process of guarding the confidential data from the unlicensed users. Data leakage happens when a system is designed to be closed to a listener reveals some information to unauthorized parties on the other hand. In this paper we proposed the survey about recent research techniques issued for detecting data leakages in a novel way. It emphasis the classification of the existing literature, developing perspective and evaluating trend.