How dlp technology protects against to insider threats

Assignment Help Dissertation
Reference no: EM131050625 , Length: word count:12000

Computing Project Proposal

The Project Aims and Objectives:

Aims: If the subject is security, external threats are the first threats taken attention and need to be taken precautions against them and insider threats targeted confidential dataare usually neglected. The aims of my project are to introduce DLP technology and explain how DLP technology protects against to insider threats intended to thieve sensitive data.

Objectives: In order to achieve this aim:

1. Confidential data and key perspectives to be able to tackle this data will be defined

2. Consequences and causes of data loss will be analysed

3. Reasons why DLP is needed will be presented

4. Current DLP technologies and how DLP protects confidential data will be analysed

5. A security policy will be developed against to data leakage problems

6. Current Host DLP systems will be evaluated and their weaknesses will be disclosed

Project Outline

The project outline will be written in accordance with the template provided by University of Liverpool. The some other subjects except the template (Abstract, Introduction, Conclusion, etc.) will be followed:

1. What is confidential Data?

2. How your data can leak?

3. Insider threats against to data loss

4. Importance of Data Loss/Leakage of confidential data

5. Key perspectives to be able to tackle confidential data

6. Safeguard against to loss of confidentially

7. What is DLP?

8. Online survey-personal stories from participants (Is DLP widespread and well-known?, How DLP effective to protect confidential data?

9. Previous technologies than DLP against to data leakage.

10. Current DLP Technologies and how DLP protects confidential data?

11. DLP Limitations

12. Developing a security policy against to data loss

13. Evaluating current Host DLP systems and results

14. Conclusion

Literature Survey / Resources' List:
Liu, S., & Kuhn, R. (2010). Data loss prevention. IT professional, 12(2), 10-13.

Agrawal, M., Kumar, S., Banerjee, A., Mukherjee, A., &Pendharkar, N. (2015). U.S. Patent No. 9,141,808. Washington, DC: U.S. Patent and Trademark Office.

Al-Fedaghi, S. (2011). A conceptual foundation for data loss prevention. system, 16, 17.

Mogull, R., &Securosis, L. L. C. (2007). Understanding and selecting a data loss prevention solution. Technicalreport, SANS Institute.

Kim, Y., Park, N., & Hong, D. (2011). Enterprise data loss prevention system having a function of coping with civil suits. In Computers, Networks, Systems, and Industrial Engineering 2011 (pp. 201-208). Springer Berlin Heidelberg

Takebayashi, T., Tsuda, H., Hasebe, T., &Masuoka, R. (2010). Data loss prevention technologies. Fujitsu Scientific and Technical Journal, 46(1), 47-55

Scholarly Contributions of the Project

Organizations and companies are like humans who would like to protect their privacy. However, advances in information technology especially networking and Internet allows attackers to find or open new ways to access private or classified information, which is also a key asset for them so it getting difficult to control over data.

While protecting data, most of organizations usually focus primarily external attacks rather than internal attacks and implement solutions like firewalls, gateways, antivirus, etc. But actually attacking internally is more easy than externally, so it is also so important that look behind safeguards implemented against to external attacks for many organizations from small ones to large holdings.

Organizations and academics are becoming aware of internal attacks and implementing DLP systems to their organizations day by day. Although there is a big interest to implement DLP systems to organizations, they are not well known and there are no so many academic papers released yet. Most of these papers give general information about DLP systems and don't contain all capabilities of DLP systems. I would like to fill this gap with my dissertation.

Looking for 12000 words (excluding tables, images and references) DLP dissertation as per proposal attached.

Special request:- Excellent English and plagiarism free work with original referencing, Need draft at regular interval.

Referencing style:- Will communicate soon

Reference no: EM131050625

Questions Cloud

Case study on setraco construction company : A research proposal on what challenges are posed by the local residents and the government to project managers and teams, Case study on Setraco construction Company, in Edo state Nigeria.
Does the board of directors authorize direct borrowings : Are assets that collateralize notes payable critically needed for the entity's continued existence?
Is assisted suicide ever ethically justifiable : What would you want people to say about you at your funeral or memorial service? You can discuss personality traits, accomplishments, etc. (After you write this, make sure you do amazing things so that your loved ones will have amazing things to ..
Create your map by starting with your social issue in center : Identify in the map at least two examples of the existing social conditions that the social issue is challenging or impacting. Some examples include the media, crime rates, and unemployment. For instance, you may find that crime and violence are l..
How dlp technology protects against to insider threats : MGT8022 PROJECT-BASED MANAGEMENT - The aims of my project are to introduce DLP technology and explain how DLP technology protects against to insider threats intended to thieve sensitive data.
Given an increase in market interest rates : Pierre Company has a 12% note payable with a carrying value of $20,000. Pierre applies the fair value option to this note. Given an increase in market interest rates, the fair value of the note is $22,600. Prepare the entry to record the fair valu..
Identify some of the organizational stressors schoolcraft : Compose a 300-500 word response in the thread to the left titled "Assignment 2: Research Assignment" that identifies some of the organizational stressors Schoolcraft documented in his recordings that patrol officers must deal with on a day to day ..
Calculating the center of mass of red markers : In the video clip, the monkey is moving. Firstly, red markers create on head, body, hands and feet of monkey. And then track the monkeys' movement with calculating the center of mass of red markers
Zopf company sells its bonds at a premium : Zopf Company sells its bonds at a premium and applies the effective-interest method in amortizing the premium. Will the annual interest expense increase or decrease over the life of the bonds? Explain.

Reviews

Write a Review

Dissertation Questions & Answers

  A critical appraisal of npt: trends and challenges

This is a thesis, focused upon the Trends and Challenges of Nuclear Power Treaty. It is a very serious issue that need to be studied in depth.

  A project on: mumbai rescued victim centre project

This paper is a comprehensive macro-management presentation of the proposed Mumbai Rescued Victims Center (MRVC), which is modeled after the Nampa Family Justice Center.

  Internet group buying

Literature review article for a top-tier journal on the topic "Internet Group Buying".

  Research on examine the influence of social media

Research on examine the influence of social media on purchasing decisions of British women travelers to purchase Turkish travel products.

  Research proposal:cargills ceylon plc

Why Cargills internal information attacked increased and how to minimize it by countermeasure ?

  Influence consumer buyer behaviours in london

Can Social Media be used as a Marketing Tool to Influence Consumer Buyer Behaviours in London?

  Log periodic dipole antenna theory

The main objective of thesis is to analyze E-fields and H-fields of LPDA using transmission line matrix method.

  Write a theoretical perspective for dissertation research

Write a Theoretical Perspective for your en visioned dissertation research.

  Constructing document trees using wordnet

It is a detailed project report in a dissertation form that how to construct a document tree by the application of Wordnet.

  Why cargills internal information attacked

Why Cargills internal information attacked increased and how to minimize it by countermeasure ?

  Write an essay on marketing design innovation

Write an essay on Marketing Design innovation

  Towards a gestic feminist dramaturgy

A proposal for dissertation on Towards a Gestic Feminist Dramaturgy

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd