Data Leak Prevention System ASurvey
Data Leak Prevention System ASurvey
net/publication/343391577
CITATIONS READS
10 660
2 authors:
All content following this page was uploaded by Pramila M. Chawan on 03 August 2020.
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
corrupt file system using an appropriate software Data Leak Prevention (DLP) systems are increasingly being
tool. implemented by various organizations. Unlike the standard
security mechanisms such as firewalls and intrusion
7. Power Failure: If you experience power failure
detection systems (IDS), the DLP systems are designated
before you have the opportunity to save your work,
systems which are used to protect in use, in transit and at
you may lose valuable data. It is better to keep
rest data. DLP system analytically uses the content and
saving as your work.
surrounding context of confidential data to detect and
prevent unauthorized access to confidential data. DLP
system that use content analysis techniques are largely
8. Software Failure: When the application software
dependent upon regular expressions, data fingerprinting,
suddenly crashes or freezes while working, this may
and statistical analysis to detect data leaks.
result in severe damage to the hard drive. This
causes the program close suddenly and all unsaved
work is lost.
2. LITRATURE REVIEW
9. Virus Attack: If a machine is deeply infected by The following are various methods to implement Data
Leak Prevention System:
viruses and worms, spyware, adware and some
deadly computer parasites, this can lead to total
corruption and loss of data. Installing a very good
1. Implementation of a single centralized DLP program:
anti-virus program will reduce the possibility of
having a fatal virus attack.
Many enterprises and business units implement
inconsistent and ad hoc DLP systems. This inconsistency
10. Malicious Attack: Professional hackers or results in lack of visibility into data assets and weak data
competitors can invade into the system and destroy security. Also, the employees tend to ignore department DLP
it. This will obviously lead to loss of data. programs that the rest of the organization does not support.
Data Leak Prevention (DLP) is the practice of detecting and 2. Evaluation of Internal Resources:
preventing data breaches, exfiltration, or unwanted
destruction of sensitive data. Organizations use DLP to
protect their data and comply with regulations and policies. To create and implement a DLP system, an organization
The term DLP refers to defending organizations against both needs skilled personnel with DLP technical expertise,
data loss and data leak prevention. The term data leak refers including DLP risk analysis, data leak response and reporting,
to an event in which important information to the data protection laws, and DLP training and awareness. Some
organization is leaked to the unauthorized environment. government regulations and policies make it mandatory for
Data leak prevention focuses on preventing illicit transfer of the organizations to either employ internal staff or retain
data outside the institutional boundaries. external consultants with data protection knowledge.
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
Employee awareness and acceptance of security policies is [1] S. Czerwinski, R. Fromm, and T. Hodes, “Digital Music
essential for DLP system. Online training, classes, periodic Distribution and Audio Watermarking,
”http://www.scientificcommons.org/430256 58, 2007.
emails, and posters can improve employee understanding of Available at: www.researchpublications.org NCAICN-
the importance of data security and enhance their ability to 2013, PRMITR,Badnera 399
follow recommended best DLP approach [2] Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting
Relational Databases: Schemes and Specialties,” IEEE
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4