0% found this document useful (0 votes)
23 views

Plagiarism-Report 2

The plagiarism scan report shows that the 785-word document contained 0% plagiarized content and was 100% unique. The document is organized into 5 chapters that summarize a research project on a website. Chapter 1 introduces the research topic and outlines the report structure. Chapter 2 discusses the timeline of the reported data leakage problem from 2003 to 2020 and highlights major data breaches. Chapter 3 will cover the website design flow and process. Chapter 4 will present and analyze the results. Chapter 5 will provide a conclusion and discuss future work.

Uploaded by

Sahil Arora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Plagiarism-Report 2

The plagiarism scan report shows that the 785-word document contained 0% plagiarized content and was 100% unique. The document is organized into 5 chapters that summarize a research project on a website. Chapter 1 introduces the research topic and outlines the report structure. Chapter 2 discusses the timeline of the reported data leakage problem from 2003 to 2020 and highlights major data breaches. Chapter 3 will cover the website design flow and process. Chapter 4 will present and analyze the results. Chapter 5 will provide a conclusion and discuss future work.

Uploaded by

Sahil Arora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PLAGIARISM SCAN REPORT

Date 2023-05-17

0%
100%

Words 785
Plagiarised Unique

Characters 5127

Content Checked For Plagiarism

1.5 Organization of the Report


Chapter 1: The introduction gives a brief outlook on what the research is about, what it includes, and the problems
highlighted whose solutions in turn are fulfilled by the site worked upon. A little research about the topic is done which
brings about the surveys that already have occurred, helping to determine and improve our work. Categorizing the tasks
that need to be achieved is also part of the introduction which helps us to distinguish and build a framework. Defining
timelines and giving a structure of what the report reflects brings about a detailed overview of what the project will show.

Chapter 2: Literature review and background study, an important aspect that reflects the time invested and research done
on our project. All the problems previously defined are given a solution that also contributes to the details of the research
paper. Some problems may be hard to tackle or there can be issues occurring which reflect the working of the project,
adding to the drawbacks. Giving a summary of all that is researched and concluded, along with a clear definition of what is
about to be going on with the site. Defining goals or objectives here can give a clear view of what needs to be achieved.

Chapter 3: Design Flow and Process deals with the working of the website. The previous chapter helps us to determine
problems, solutions, drawbacks, and every aspect the research concludes giving a clearer objective on what needs to be
achieved. The how objective needs to be achieved is dealt with in the design flow. The basic layout, structure, and design
of the website are worked upon along with all the coding, development, and features that need to be the part of our
product. Alternate solutions are found and the best approach is finalized and worked on to achieve a successful model
which clearly fulfills almost every objective.

Chapter 4: Result analysis is the part where the final design along with a proper flowchart is presented and then finally the
successfully running product is displayed along with the proper details of management of both the product and report.

Chapter 5: Conclusion and Future work will be the last phase of the report which sums up everything that’ll be done till the
very end where our working product is achieved along with all the solutions that were once a problem in the beginning.
Any changes from original objective or any modified versions of what finally as a product is gained are mentioned in
conclusion. Future work includes what else could be done for improvement or betterment, also how can one overcome the
drawbacks that are being faced.

These 5 chapters of the report summarizes our whole project giving a third person a detailed yet specific version of the
project. Problems, Solutions and every little important detail is talked about helping anyone to understand and go through
about how and what is being accomplished.

CHAPTER 2
LITERATURE
REVIEW/BACKGROUND STUDY

Page 1 of 2
2.1 Timeline of the Reported Problem

Data leakage is a significant problem in the digital era. The problem is prevalent across various sectors, including
healthcare, finance, and government agencies. Data leakage can lead to privacy breaches, financial losses, and reputational
damage to organizations. The problem of data leakage has been on the rise since the early 2000s, with the increasing use
of digital technologies and the internet. The rise of cloud computing and big data has further exacerbated the problem.

2003: The first major data breach occurs when hackers gain access to customer data at TJX Companies, exposing 45.7
million credit and debit card numbers.

2005: A laptop containing personal information on 28,000 NASA employees is stolen, highlighting the risk of data leakage
through portable devices.

2007: The credit reporting agency, Equifax, suffers a data breach that compromises the personal information of 143 million
consumers.

2013: Edward Snowden leaks classified information from the National Security Agency, prompting concerns about insider
threats and the need for better data protection.

2017: The WannaCry ransomware attack infects hundreds of thousands of computers worldwide, highlighting the
importance of proactive measures for detecting and preventing data leakage.

2018: The European Union's General Data Protection Regulation (GDPR) goes into effect, imposing strict requirements for
data protection and breach notification.

2020: The COVID-19 pandemic leads to a surge in remote work, creating new challenges for data leakage prevention as
employees access sensitive information from outside the office.

This timeline shows that data leakage has been a significant problem for many years, with high-profile breaches occurring
across a range of industries and settings. As technology continues to evolve and new threats emerge, it is important to stay
vigilant and take proactive measures to protect sensitive data.

Matched Source

No plagiarism found

Page 2 of 2

You might also like