2019
DOI: 10.1016/j.jnca.2019.07.006
|View full text |Cite
|
Sign up to set email alerts
|

Using malware for the greater good: Mitigating data leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Van der Kleij et al 5 analyzed the interaction of employee knowledge, opportunity, and motivation based on the data leakage prevention behaviors of 384 bank employees and proposed a framework to shape a corporate culture to prevent data leakage of employees. In view of the problem of accidental data leakage caused by mail, network, and more, Guri et al 6 proposed a method to simulate the leakage scenario of real network topology. Eom and Huh 7 studied the problem of leaking users’ personal information by the internet of things system (IoTSyS) and proposed an anonymous scheme taking into account information protection and legitimate user confirmation to provide a solution for the privacy protection of IoTSyS.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Van der Kleij et al 5 analyzed the interaction of employee knowledge, opportunity, and motivation based on the data leakage prevention behaviors of 384 bank employees and proposed a framework to shape a corporate culture to prevent data leakage of employees. In view of the problem of accidental data leakage caused by mail, network, and more, Guri et al 6 proposed a method to simulate the leakage scenario of real network topology. Eom and Huh 7 studied the problem of leaking users’ personal information by the internet of things system (IoTSyS) and proposed an anonymous scheme taking into account information protection and legitimate user confirmation to provide a solution for the privacy protection of IoTSyS.…”
Section: Related Workmentioning
confidence: 99%
“…The macro level includes the generation mechanism of personal information leakage, 2,3 transmission process, 4 and governance countermeasures. [5][6][7][8][9] Based on 650 cases of personal information infringement, Ye and Zhao 3 analyzed and explained the mechanism using an economic model and concluded that personal information infringement was characterized by high quantity, low risk, low cost, light punishment, high crime success rate, and high income. Based on the dissemination theory, Ma and Xu 4 improved the Rathwell model and thought that the communication included two sources of hackers and moles, two communication modes of platform leakage and individual trafficking, and five leakage consequences of promotion, illegal business competition, and criminal crimes.…”
Section: Invasion Mechanism Of Personal Informationmentioning
confidence: 99%
“…In [31], [32] and [33], the enterprise digital rights management (eDRM) system is presented, which provides persistent protection for documents using cryptographic methods and also includes features for document protection that are easy to use for the enterprise. In the study [34] the authors reveal the importance of DRM solutions to prevent unauthorized users, inside or outside the boundaries of the organization, from reading an accidentally sent document. As well as, their limitations towards certain types of documents, in addition to preventing the file from further propagation on the external network once filtered, nor an expert hacker from attempting to decrypt the file's content.…”
Section: Drm For Document Protectionmentioning
confidence: 99%
“…Using malware for the greater good: Mitigating data leakage [34] DocGuard is the method proposed in this study to protect against accidental data leakage. It consists of making antimalware and antivirus software active on storage systems, detect the leaked file and block access to it.…”
Section: + Encryption + Steganography Techniquesmentioning
confidence: 99%