Reference no: EM131050625 , Length: word count:12000
Computing Project Proposal
The Project Aims and Objectives:
Aims: If the subject is security, external threats are the first threats taken attention and need to be taken precautions against them and insider threats targeted confidential dataare usually neglected. The aims of my project are to introduce DLP technology and explain how DLP technology protects against to insider threats intended to thieve sensitive data.
Objectives: In order to achieve this aim:
1. Confidential data and key perspectives to be able to tackle this data will be defined
2. Consequences and causes of data loss will be analysed
3. Reasons why DLP is needed will be presented
4. Current DLP technologies and how DLP protects confidential data will be analysed
5. A security policy will be developed against to data leakage problems
6. Current Host DLP systems will be evaluated and their weaknesses will be disclosed
Project Outline
The project outline will be written in accordance with the template provided by University of Liverpool. The some other subjects except the template (Abstract, Introduction, Conclusion, etc.) will be followed:
1. What is confidential Data?
2. How your data can leak?
3. Insider threats against to data loss
4. Importance of Data Loss/Leakage of confidential data
5. Key perspectives to be able to tackle confidential data
6. Safeguard against to loss of confidentially
7. What is DLP?
8. Online survey-personal stories from participants (Is DLP widespread and well-known?, How DLP effective to protect confidential data?
9. Previous technologies than DLP against to data leakage.
10. Current DLP Technologies and how DLP protects confidential data?
11. DLP Limitations
12. Developing a security policy against to data loss
13. Evaluating current Host DLP systems and results
14. Conclusion
Literature Survey / Resources' List:
Liu, S., & Kuhn, R. (2010). Data loss prevention. IT professional, 12(2), 10-13.
Agrawal, M., Kumar, S., Banerjee, A., Mukherjee, A., &Pendharkar, N. (2015). U.S. Patent No. 9,141,808. Washington, DC: U.S. Patent and Trademark Office.
Al-Fedaghi, S. (2011). A conceptual foundation for data loss prevention. system, 16, 17.
Mogull, R., &Securosis, L. L. C. (2007). Understanding and selecting a data loss prevention solution. Technicalreport, SANS Institute.
Kim, Y., Park, N., & Hong, D. (2011). Enterprise data loss prevention system having a function of coping with civil suits. In Computers, Networks, Systems, and Industrial Engineering 2011 (pp. 201-208). Springer Berlin Heidelberg
Takebayashi, T., Tsuda, H., Hasebe, T., &Masuoka, R. (2010). Data loss prevention technologies. Fujitsu Scientific and Technical Journal, 46(1), 47-55
Scholarly Contributions of the Project
Organizations and companies are like humans who would like to protect their privacy. However, advances in information technology especially networking and Internet allows attackers to find or open new ways to access private or classified information, which is also a key asset for them so it getting difficult to control over data.
While protecting data, most of organizations usually focus primarily external attacks rather than internal attacks and implement solutions like firewalls, gateways, antivirus, etc. But actually attacking internally is more easy than externally, so it is also so important that look behind safeguards implemented against to external attacks for many organizations from small ones to large holdings.
Organizations and academics are becoming aware of internal attacks and implementing DLP systems to their organizations day by day. Although there is a big interest to implement DLP systems to organizations, they are not well known and there are no so many academic papers released yet. Most of these papers give general information about DLP systems and don't contain all capabilities of DLP systems. I would like to fill this gap with my dissertation.
Looking for 12000 words (excluding tables, images and references) DLP dissertation as per proposal attached.
Special request:- Excellent English and plagiarism free work with original referencing, Need draft at regular interval.
Referencing style:- Will communicate soon